Author of the publication

Privacy preserving 2-party queries on bipartite graphs with private set intersection.

, , and . SAC, page 1867-1870. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FPGA Implementations of 256-Bit SNOW Stream Ciphers for Postquantum Mobile Security., , and . IEEE Trans. Very Large Scale Integr. Syst., 29 (11): 1943-1954 (2021)Density in discrete systems.. Current Trends in Theoretical Computer Science, volume 40 of World Scientific Series in Computer Science, World Scientific, (1993)Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks., , , , and . Mob. Networks Appl., 18 (3): 413-428 (2013)Editorial for the LTE special section.. Comput. Commun., 33 (16): 1893 (2010)Parental Control with Edge Computing and 5G Networks., , and . FRUCT, page 290-300. IEEE, (2021)TWOPRIME: A Fast Stream Ciphering Algorithm., , , and . FSE, volume 1267 of Lecture Notes in Computer Science, page 88-102. Springer, (1997)Maximal Dense Intervals of Grammar Forms.. ICALP, volume 317 of Lecture Notes in Computer Science, page 424-438. Springer, (1988)Issues with Applying Cryptography in Wireless Systems.. Theory Is Forever, volume 3113 of Lecture Notes in Computer Science, page 205-215. Springer, (2004)Distributed Usage Control., , and . ANT/MobiWIS, volume 5 of Procedia Computer Science, page 562-569. Elsevier, (2011)Evaluating the performance and privacy of a token-based collaborative recommender., and . WI, page 1049-1053. ACM, (2017)