Author of the publication

From Keys to Databases - Real-World Applications of Secure Multi-Party Computation.

, , , , , , , and . Comput. J., 61 (12): 1749-1771 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

UN Handbook on Privacy-Preserving Computation Techniques., , , , , , , , , and 3 other author(s). CoRR, (2023)Superimposed Information Architecture for Digital Libraries., , , , , , , , , and 2 other author(s). ECDL, volume 5173 of Lecture Notes in Computer Science, page 88-99. Springer, (2008)RACK: A Semantic Model and Triplestore for Curation of Assurance Case Evidence., , , , , , , , and . SAFECOMP Workshops, volume 14182 of Lecture Notes in Computer Science, page 149-160. Springer, (2023)Detecting Cyberattack Entities from Audit Data via Multi-View Anomaly Detection with Feedback., , , , , and . AAAI Workshops, volume WS-18 of AAAI Technical Report, page 277-284. AAAI Press, (2018)A Conceptual Model and Predicate Language for Data Selection and Projection Based on Provenance., and . TaPP, USENIX Association, (2010)Ensemble PDP-8: eight principles for distributed portals., , , , , , , , , and 4 other author(s). JCDL, page 341-344. ACM, (2010)Computing with Data Privacy: Steps toward Realization., and . IEEE Secur. Priv., 13 (1): 22-29 (2015)Maturity and Performance of Programmable Secure Computation., , , and . IEEE Secur. Priv., 14 (5): 48-56 (2016)RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications., , , , , , and . WAHC@CCS, page 57-68. ACM, (2019)BASALISC: Programmable Hardware Accelerator for BGV Fully Homomorphic Encryption., , , , , , , , , and 1 other author(s). IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023 (4): 32-57 (2023)