Author of the publication

Data structures for limited oblivious execution of programs while preserving locality of reference.

, , and . Digital Rights Management Workshop, page 63-69. ACM, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Preserving CACTUS Algorithm for Clustering over Vertically Partitioned Databases., and . DMIN, page 308-314. CSREA Press, (2007)A note on the Certificateless Multi-receiver Signcryption Scheme., , and . IACR Cryptology ePrint Archive, (2009)Compact CCA-Secure Encryption with Ciphertext Verifiability., , and . IACR Cryptology ePrint Archive, (2011)Foundations of Group Key Management - Framework, Security Model and a Generic Construction., , , and . IACR Cryptology ePrint Archive, (2008)A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers., , and . IACR Cryptology ePrint Archive, (2016)Brief announcement: communication efficient asynchronous byzantine agreement., and . PODC, page 243-244. ACM, (2010)Brief announcement: on the round complexity of distributed consensus over synchronous networks., , , , and . PODC, page 397. ACM, (2004)Possibility and complexity of probabilistic reliable communication in directed networks., and . PODC, page 265-274. ACM, (2006)Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries., , and . ACISP, volume 2384 of Lecture Notes in Computer Science, page 497-512. Springer, (2002)On Proactive Perfectly Secure Message Transmission., , and . ACISP, volume 4586 of Lecture Notes in Computer Science, page 461-473. Springer, (2007)