Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Crowdsourced Query Processing on Microblogs., , , and . DASFAA (1), volume 9642 of Lecture Notes in Computer Science, page 18-32. Springer, (2016)Crowd-Selection Query Processing in Crowdsourcing Databases: A Task-Driven Approach., , , , and . EDBT, page 397-408. OpenProceedings.org, (2015)Reducing Participation Costs via Incremental Verification for Ledger Systems., , , and . IACR Cryptol. ePrint Arch., (2020)Yafa-108/146: Implementing ed25519-embedding Cocks-Pinch curves in arkworks-rs., and . IACR Cryptol. ePrint Arch., (2022)Building Cryptographic Systems from Distributed Trust. University of California, Berkeley, USA, (2022)Metal: A Metadata-Hiding File-Sharing System., and . NDSS, The Internet Society, (2020)HOLMES: Efficient Distribution Testing for Secure Collaborative Learning., , , , and . USENIX Security Symposium, page 4823-4840. USENIX Association, (2023)MPCAuth: Multi-factor Authentication for Distributed-trust Systems., , , and . SP, page 829-847. IEEE, (2023)Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning., , , , , and . USENIX Security Symposium, page 2723-2740. USENIX Association, (2021)Titanium: A Metadata-Hiding File-Sharing System with Malicious Security., , , and . NDSS, The Internet Society, (2022)