Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enabling multi-layer cyber-security assessment of Industrial Control Systems through Hardware-In-The-Loop testbeds., , , , and . ASP-DAC, page 511-518. IEEE, (2016)$MP\ellC$: Privacy-Preserving IP Verification Using Logic Locking and Secure Multiparty Computation., , and . IOLTS, page 1-8. IEEE, (2023)Accelerated Encrypted Execution of General-Purpose Applications., , , , , and . IACR Cryptol. ePrint Arch., (2023)Trust No One: Thwarting "heartbleed" Attacks Using Privacy-Preserving Computation., and . ISVLSI, page 59-64. IEEE Computer Society, (2014)Juliet: A Configurable Processor for Computing on Encrypted Data., , and . IEEE Trans. Computers, 73 (9): 2335-2349 (September 2024)Tyche: Probabilistic Selection over Encrypted Data for Generative Language Models., and . IACR Cryptol. ePrint Arch., (2024)NFTs for 3D Models: Sustaining Ownership in Industry 4.0., and . IEEE Consumer Electron. Mag., 13 (5): 13-22 (September 2024)Obfuscated arbitrary computation using cryptographic primitives., and . IDT, page 5-8. IEEE, (2015)E3: A Framework for Compiling C++ Programs with Encrypted Operands., , , and . IACR Cryptology ePrint Archive, (2018)New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks., , and . IACR Cryptol. ePrint Arch., (2022)