Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EncDBDB: Searchable Encrypted, Fast, Compressed, In-Memory Database using Enclaves., , and . CoRR, (2020)Efficient Oblivious Database Joins., , and . CoRR, (2020)SFour: A Protocol for Cryptographically Secure Record Linkage at Scale., and . ICDE, page 277-288. IEEE, (2020)Investigating Membership Inference Attacks under Data Dependencies., , , , , , and . CSF, page 473-488. IEEE, (2023)The Limits of Word Level Differential Privacy., , and . NAACL-HLT (Findings), page 867-881. Association for Computational Linguistics, (2022)Secure Sublinear Time Differentially Private Median Computation., and . NDSS, The Internet Society, (2020)Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection., , and . NDSS, The Internet Society, (2023)SAGMA: Secure Aggregation Grouped by Multiple Attributes., , and . SIGMOD Conference, page 587-601. ACM, (2020)PCOR: Private Contextual Outlier Release via Differentially Private Search., , and . SIGMOD Conference, page 1571-1583. ACM, (2021)Mixed-Technique Multi-Party Computations Composed of Two-Party Computations., and . ESORICS (3), volume 13556 of Lecture Notes in Computer Science, page 295-319. Springer, (2022)