Author of the publication

Verifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic Lists and Trees.

, , , and . SCN, volume 9841 of Lecture Notes in Computer Science, page 216-236. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Verifiable Range and Closest Point Queries in Zero-Knowledge., , and . Proc. Priv. Enhancing Technol., 2016 (4): 373-388 (2016)Propagation = Lazy Clause Generation., , and . CP, volume 4741 of Lecture Notes in Computer Science, page 544-558. Springer, (2007)Elephants Do Not Forget: Differential Privacy with State Continuity for Privacy Budget., , , , , and . CoRR, (2024)Challenges towards the Next Frontier in Privacy., , , , , , , , , and 14 other author(s). CoRR, (2023)Attribute Privacy: Framework and Mechanisms., , and . CoRR, (2020)Propagation via lazy clause generation., , and . Constraints An Int. J., 14 (3): 357-391 (2009)Leakage of Dataset Properties in Multi-Party Machine Learning., , and . USENIX Security Symposium, page 2687-2704. USENIX Association, (2021)Verifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic Lists and Trees., , , and . SCN, volume 9841 of Lecture Notes in Computer Science, page 216-236. Springer, (2016)Contamination Attacks and Mitigation in Multi-Party Machine Learning., and . NeurIPS, page 6604-6616. (2018)Analyzing Information Leakage of Updates to Natural Language Models., , , , , , , and . CCS, page 363-375. ACM, (2020)