Author of the publication

Privacy preserving 2-party queries on bipartite graphs with private set intersection.

, , and . SAC, page 1867-1870. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Aware Contact Sharing for Groups in P2P Networks., , and . Int. J. Embed. Real Time Commun. Syst., 12 (4): 36-54 (2021)Secure Multiparty Computations Without Computers., and . Theor. Comput. Sci., 191 (1-2): 173-183 (1998)How to Prevent Buying of Votes in Computer Elections., and . ASIACRYPT, volume 917 of Lecture Notes in Computer Science, page 164-170. Springer, (1994)Man-in-the-Middle in Tunnelled Authentication Protocols., , and . IACR Cryptology ePrint Archive, (2002)Concealing IMSI in 5G Network Using Identity Based Encryption., and . NSS, volume 10394 of Lecture Notes in Computer Science, page 544-554. Springer, (2017)Mind Your Right to Know: On De-anonymization Auditability in V2X Communications., , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 604-610. Springer, (2017)Man-in-the-Middle in Tunnelled Authentication Protocols., , and . Security Protocols Workshop, volume 3364 of Lecture Notes in Computer Science, page 28-41. Springer, (2003)On De-synchronization of User Pseudonyms in Mobile Networks., , , and . ICISS, volume 10717 of Lecture Notes in Computer Science, page 347-366. Springer, (2017)Private Membership Test for Bloom Filters., , , and . TrustCom/BigDataSE/ISPA (1), page 515-522. IEEE, (2015)Editorial: Special issue on trust in cyber, physical and social computing., , , and . Comput. Secur., (2014)