Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An adaptive prediction based approach for congestion estimation in active queue management (APACE)., , and . GLOBECOM, page 4153-4157. IEEE, (2003)UC-Secure Multiparty Computation from One-Way Functions Using Stateless Tokens., , , and . ASIACRYPT (2), volume 11922 of Lecture Notes in Computer Science, page 577-605. Springer, (2019)Feelbot: Reducing Use of Bad Words in Children through Wearable using Artificial Intelligence and Gamification., and . IDC, page 777-781. ACM, (2017)zkSaaS: Zero-Knowledge SNARKs as a Service., , , , and . USENIX Security Symposium, page 4427-4444. USENIX Association, (2023)QoS-aware dynamic controller implantation over vSDN-enabled UAV networks for real-time service delivery., , , and . DroneCom@MobiCom, page 37-42. ACM, (2021)Two Round Information-Theoretic MPC with Malicious Security., , , and . IACR Cryptol. ePrint Arch., (2018)Self-Processing Private Sensor Data via Garbled Encryption., , and . Proc. Priv. Enhancing Technol., 2020 (4): 434-460 (2020)Secure Multiparty Computation with Free Branching., , , and . EUROCRYPT (1), volume 13275 of Lecture Notes in Computer Science, page 397-426. Springer, (2022)QoS-aware Controller and Hypervisor Placement in vSDN-enabled 5G Networks for Time-critical Applications., , , and . INFOCOM Workshops, page 1-6. IEEE, (2021)Activity profiling: Review of different solutions to develop reliable and performant design., , , , , , , , , and . IOLTS, page 47-50. IEEE, (2016)