Author of the publication

Keyed Non-parametric Hypothesis Tests.

, , , , and . NSS, volume 11928 of Lecture Notes in Computer Science, page 632-645. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Get-your-ID: Decentralized Proof of Identity., and . FPS, volume 12056 of Lecture Notes in Computer Science, page 327-336. Springer, (2019)PURED: A Unified Framework for Resource-Hard Functions., and . INDOCRYPT (2), volume 14460 of Lecture Notes in Computer Science, page 126-149. Springer, (2023)PlasticCoin: an ERC20 Implementation on Hyperledger Fabric for Circular Economy and Plastic Reuse., , and . WI (Companion), page 223-230. ACM, (2019)Approaching Optimal Duplicate Detection in a Sliding Window., , and . COCOON, volume 12273 of Lecture Notes in Computer Science, page 64-84. Springer, (2020)A blockchain-based marketplace platform for circular economy., , and . SAC, page 1746-1749. ACM, (2021)Keyed Non-parametric Hypothesis Tests., , , , and . NSS, volume 11928 of Lecture Notes in Computer Science, page 632-645. Springer, (2019)Secure Outsourcing of Multi-Armed Bandits., , , and . TrustCom, page 202-209. IEEE, (2020)A silver bullet?: a comparison of accountants and developers mental models in the raise of blockchain., , , and . ARES, page 83:1-83:10. ACM, (2020)Security of cryptographic protocols and data structures : design and optimisation. (Sécurité des protocoles et structures de données : modélisation et optimisation).. PSL University, Paris, France, (2021)Secure Best Arm Identification in Multi-armed Bandits., , , and . ISPEC, volume 11879 of Lecture Notes in Computer Science, page 152-171. Springer, (2019)