Author of the publication

Size-Hiding in Private Set Intersection: Existential Results and Constructions.

, , , and . AFRICACRYPT, volume 7374 of Lecture Notes in Computer Science, page 378-394. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Long-term Measurement and Analysis of the Free Proxy Ecosystem., , and . TWEB, 13 (4): 18:1-18:22 (2019)Participatory Privacy: Enabling Privacy in Participatory Sensing, and . CoRR, (2012)Securing Cloud Data in the New Attacker Model., , , and . IACR Cryptology ePrint Archive, (2014)Hummingbird: Privacy at the time of Twitter., , , and . IACR Cryptology ePrint Archive, (2011)Secure enrollment and practical migration for mobile trusted execution environments., , , , and . SPSM@CCS, page 93-98. ACM, (2013)Intrusion-resilient integrity in data-centric unattended WSNs., , , and . Pervasive Mob. Comput., 7 (4): 495-508 (2011)Data Security in Unattended Wireless Sensor Networks., , , , and . IEEE Trans. Computers, 58 (11): 1500-1511 (2009)Subversion-Resilient Enhanced Privacy ID., , , and . IACR Cryptol. ePrint Arch., (2020)Auditable Asymmetric Password Authenticated Public Key Establishment., , , and . CANS, volume 13641 of Lecture Notes in Computer Science, page 122-142. Springer, (2022)Subversion-Resilient Enhanced Privacy ID., , , and . CT-RSA, volume 13161 of Lecture Notes in Computer Science, page 562-588. Springer, (2022)