Author of the publication

Poststratification without population level information on the poststratifying variable with application to political polling

, , and . J. Amer. Statist. Assoc., 96 (453): 1--11 (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Universally Composable Multi-party Computation Using Tamper-Proof Hardware.. EUROCRYPT, volume 4515 of Lecture Notes in Computer Science, page 115-128. Springer, (2007)Round-Efficient Secure Computation in Point-to-Point Networks., and . EUROCRYPT, volume 4515 of Lecture Notes in Computer Science, page 311-328. Springer, (2007)Secure text processing with applications to private DNA matching., and . ACM Conference on Computer and Communications Security, page 485-492. ACM, (2010)Efficiency improvements for signature schemes with tight security reductions., and . ACM Conference on Computer and Communications Security, page 155-164. ACM, (2003)Characterization of Security Notions for Probabilistic Private-Key Encryption., and . J. Cryptol., 19 (1): 67-95 (2006)Complete fairness in secure two-party computation., , , and . STOC, page 413-422. ACM, (2008)Complete Fairness in Multi-party Computation without an Honest Majority., and . TCC, volume 5444 of Lecture Notes in Computer Science, page 19-35. Springer, (2009)Limits of Computational Differential Privacy in the Client/Server Setting., , and . TCC, volume 6597 of Lecture Notes in Computer Science, page 417-431. Springer, (2011)Efficient Rational Secret Sharing in Standard Communication Networks., , and . TCC, volume 5978 of Lecture Notes in Computer Science, page 419-436. Springer, (2010)Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption., and . CT-RSA, volume 3376 of Lecture Notes in Computer Science, page 87-103. Springer, (2005)