Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Protection in Big Data Analysis.. University of Waterloo, Ontario, Canada, (2021)base-search.net (ftunivwaterloo:oai:uwspace.uwaterloo.ca:10012/17319).Equi-Joins over Encrypted Data for Series of Queries., , , , and . ICDE, page 1635-1648. IEEE, (2022)A Post-Quantum One Time Signature Using Bloom Filter., and . PST, page 397-399. IEEE Computer Society, (2017)On the Robustness of Backdoor-based Watermarking in Deep Neural Networks., , , , and . IH&MMSec, page 177-188. ACM, (2021)PCOR: Private Contextual Outlier Release via Differentially Private Search., , and . SIGMOD Conference, page 1571-1583. ACM, (2021)Practical Over-Threshold Multi-Party Private Set Intersection., , , , , , , , , and . ACSAC, page 772-783. ACM, (2020)Differentially Private Two-Party Set Operations., , , , , , , , , and . EuroS&P, page 390-404. IEEE, (2020)A Scalable Post-quantum Hash-Based Group Signature., , and . IACR Cryptology ePrint Archive, (2019)On the Robustness of the Backdoor-based Watermarking in Deep Neural Networks., , , and . CoRR, (2019)Equi-Joins Over Encrypted Data for Series of Queries., , , , and . CoRR, (2021)