Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anonymity for Key-Trees with Adaptive Adversaries., and . SecureComm, volume 96 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 409-425. Springer, (2011)Secure Multi-party Computation and Its Applications.. I4CS, volume 1585 of Communications in Computer and Information Science, page 3-5. Springer, (2022)Secure integer division with a private divisor., and . Proc. Priv. Enhancing Technol., 2021 (4): 339-349 (2021)Privacy-preserving content-based recommender system., , , and . MM&Sec, page 77-84. ACM, (2012)Improved Anonymity for Key-Trees., and . RFIDSec, volume 7739 of Lecture Notes in Computer Science, page 31-47. Springer, (2012)Privacy-Preserving Coupling of Vertically-Partitioned Databases and Subsequent Training with Gradient Descent., , , and . CSCML, volume 12716 of Lecture Notes in Computer Science, page 38-51. Springer, (2021)A New Approach to Privacy-Preserving Clinical Decision Support Systems for HIV Treatment., , , , , , , , , and 2 other author(s). CoRR, (2018)Processing in the encrypted domain using a composite signal representation: Pros and cons., , , and . WIFS, page 176-180. IEEE, (2009)Towards Quantum-Safe VPNs and Internet., , , and . IACR Cryptology ePrint Archive, (2019)A Framework for Secure Computations With Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations., , , and . IEEE Trans. Inf. Forensics Secur., 10 (3): 445-457 (2015)