Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nearest neighbour search over encrypted data using intel SGX., , , , and . J. Inf. Secur. Appl., (2020)SAFETY: Secure gwAs in Federated Environment Through a hYbrid solution with Intel SGX and Homomorphic Encryption., , , , , and . CoRR, (2017)Parallel Generalized Suffix Tree Construction for Genomic Data., , and . AlCoB, volume 12099 of Lecture Notes in Computer Science, page 3-15. Springer, (2020)Due to COVID-19 postponed to AlCoB 2021..CPU and GPU Accelerated Fully Homomorphic Encryption., , and . HOST, page 142-153. IEEE, (2020)Who are you talking to like that? Exploring adults' ability to discriminate child- and adult-directed speech across languages., , , and . CogSci, page 3419. cognitivesciencesociety.org, (2019)Generalized genomic data sharing for differentially private federated learning., , , and . J. Biomed. Informatics, (2022)Privacy-preserving techniques on genomic data ; Privacy-Preserving Techniques on Healthcare Data.. University of Manitoba, Winnipeg, Canada, (2022)base-search.net (ftunivmanitoba:oai:mspace.lib.umanitoba.ca:1993/36541).Secure and Efficient Multiparty Computation on Genomic Data., , , and . IDEAS, page 278-283. ACM, (2016)Privacy preserving neural networks for electronic health records de-identification., , , and . BCB, page 8:1-8:6. ACM, (2021)