Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Locality-Preserving Oblivious RAM., , , , , and . J. Cryptol., 35 (2): 6 (2022)Max-min greedy matching problem: Hardness for the adversary and fractional variant., , and . Theor. Comput. Sci., (February 2024)Distributed Private Data Analysis: Lower Bounds and Practical Constructions., , , and . ACM Trans. Algorithms, 13 (4): 50:1-50:38 (2017)MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture., , , and . IACR Cryptology ePrint Archive, (2020)Revisiting Opinion Dynamics with Varying Susceptibility to Persuasion via Non-Convex Local Search., , and . WWW, page 173-183. ACM, (2019)Finding Subgraphs with Maximum Total Density and Limited Overlap., , , , and . WSDM, page 379-388. ACM, (2015)Re-revisiting Learning on Hypergraphs: Confidence Interval and Subgradient Method., , , and . ICML, volume 70 of Proceedings of Machine Learning Research, page 4026-4034. PMLR, (2017)More is Less: Perfectly Secure Oblivious Algorithms in the Multi-server Setting., , , , and . ASIACRYPT (3), volume 11274 of Lecture Notes in Computer Science, page 158-188. Springer, (2018)Online Submodular Maximization with Free Disposal., , , , and . ACM Trans. Algorithms, 14 (4): 56:1-56:29 (2018)A QPTAS for TSP with Fat Weakly Disjoint Neighborhoods in Doubling Metrics., and . Discret. Comput. Geom., 46 (4): 704-723 (2011)