Author of the publication

Authenticating Email Search Results.

, , and . STM, volume 7783 of Lecture Notes in Computer Science, page 225-240. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authenticating Email Search Results., , and . STM, volume 7783 of Lecture Notes in Computer Science, page 225-240. Springer, (2012)Randomize the Future: Asymptotically Optimal Locally Private Frequency Estimation Protocol for Longitudinal Data., , and . PODS, page 237-249. ACM, (2022)Efficient Oblivious Permutation via the Waksman Network., , and . AsiaCCS, page 771-783. ACM, (2022)Data-Oblivious Algorithms for Privacy-Preserving Access to Cloud Storage.. Brown University, USA, (2014)An Algorithmic Framework For Differentially Private Data Analysis on Trusted Processors., , , , , and . NeurIPS, page 13635-13646. (2019)Propagation = Lazy Clause Generation., , and . CP, volume 4741 of Lecture Notes in Computer Science, page 544-558. Springer, (2007)Contamination Attacks and Mitigation in Multi-Party Machine Learning., and . NeurIPS, page 6604-6616. (2018)Verifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic Lists and Trees., , , and . SCN, volume 9841 of Lecture Notes in Computer Science, page 216-236. Springer, (2016)Leakage of Dataset Properties in Multi-Party Machine Learning., , and . USENIX Security Symposium, page 2687-2704. USENIX Association, (2021)Analyzing Information Leakage of Updates to Natural Language Models., , , , , , , and . CCS, page 363-375. ACM, (2020)