Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differentially private recommender systems: building privacy into the net, and . KDD, page 627-636. ACM, (2009)Data collection with self-enforcing privacy., , and . CCS, page 69-78. ACM, (2006)Application of analysis of algorithms in cryptography.. Stanford University, USA, (2004)Antipodes of Label Differential Privacy: PATE and ALIBI., , , , and . NeurIPS, page 6934-6945. (2021)(Not So) Random Shuffles of RC4.. CRYPTO, volume 2442 of Lecture Notes in Computer Science, page 304-319. Springer, (2002)Domain Extension for Enhanced Target Collision-Resistant Hash Functions.. FSE, volume 6147 of Lecture Notes in Computer Science, page 153-167. Springer, (2010)Uncheatable Distributed Computations., and . CT-RSA, volume 2020 of Lecture Notes in Computer Science, page 425-440. Springer, (2001)Collision-Resistant No More: Hash-and-Sign Paradigm Revisited.. Public Key Cryptography, volume 3958 of Lecture Notes in Computer Science, page 140-156. Springer, (2006)Scalable Private Learning with PATE., , , , , and . ICLR, OpenReview.net, (2018)On the Protection of Private Information in Machine Learning Systems: Two Recent Approches., , , , , , , and . CSF, page 1-6. IEEE Computer Society, (2017)