Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experimental Analysis of Key Exchange Protocols Using the JAKE Framework., and . COMM, page 1-6. IEEE, (2022)Efficient Secure Floating-point Arithmetic using Shamir Secret Sharing.. ICETE (2), page 49-60. SciTePress, (2019)Secure Multiparty Linear Programming Using Fixed-Point Arithmetic., and . ESORICS, volume 6345 of Lecture Notes in Computer Science, page 134-150. Springer, (2010)Secure Computation with Fixed-Point Numbers., and . Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, page 35-50. Springer, (2010)Complexity and Performance of Secure Floating-Point Polynomial Evaluation Protocols.. ESORICS (2), volume 12973 of Lecture Notes in Computer Science, page 352-369. Springer, (2021)Security threats identification and definition in early design phases of automotive IT services., , and . COMM, page 125-128. IEEE, (2020)Comparative Performance Evaluation of Key Exchange Protocols., and . COMM, page 1-6. IEEE, (2022)Multiparty Computation of Fixed-Point Multiplication and Reciprocal., and . DEXA Workshops, page 107-111. IEEE Computer Society, (2009)An Ensemble of Deep Convolutional Neural Networks for Drunkenness Detection Using Thermal Infrared Facial Imagery., , and . COMM, page 147-150. IEEE, (2020)Multi-Criteria server selection for over-the-top video streaming.. COMM, page 303-308. IEEE, (2016)