Author of the publication

Orchestrating Collaborative Cybersecurity: A Secure Framework for Distributed Privacy-Preserving Threat Intelligence Sharing.

, , , , , , and . CoRR, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CryptoDSPs for Cloud Privacy., and . WISE Workshops, volume 6724 of Lecture Notes in Computer Science, page 428-439. Springer, (2010)Multiparty Homomorphic Encryption from Ring-Learning-with-Errors., , , and . Proc. Priv. Enhancing Technol., 2021 (4): 291-311 (2021)Orchestrating Collaborative Cybersecurity: A Secure Framework for Distributed Privacy-Preserving Threat Intelligence Sharing., , , , , , and . CoRR, (2022)Co-creating Security-and-Privacy-by-Design Systems., , , , , and . ARES, page 768-775. IEEE Computer Society, (2016)Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation., , and . ACNS, volume 13269 of Lecture Notes in Computer Science, page 521-541. Springer, (2022)Efficient protocols for secure adaptive filtering., and . ICASSP, page 5860-5863. IEEE, (2011)Privacy preserving error resilient dna searching through oblivious automata., , and . ACM Conference on Computer and Communications Security, page 519-528. ACM, (2007)Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-Sparse Keys., , , and . IACR Cryptol. ePrint Arch., (2020)Secure Adaptive Filtering., and . IEEE Trans. Inf. Forensics Secur., 6 (2): 469-485 (2011)POSEIDON: Privacy-Preserving Federated Neural Network Learning., , , , , , and . CoRR, (2020)