Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Logistic Regression Model Training based on the Approximate Homomorphic Encryption., , , , and . IACR Cryptology ePrint Archive, (2018)Homomorphic Computation of Edit Distance., , and . Financial Cryptography Workshops, volume 8976 of Lecture Notes in Computer Science, page 194-212. Springer, (2015)Homomorphic Computation of Local Alignment., , , , , and . BIBM, page 2167-2174. IEEE, (2020)ViziCal: accurate energy expenditure prediction for playing exergames., , , and . UIST, page 397-404. ACM, (2013)The evolving privacy and security concerns for genomic data analysis and sharing as observed from the iDASH competition., , , , , , , , , and 3 other author(s). J. Am. Medical Informatics Assoc., 29 (12): 2182-2190 (2022)Private genome analysis through homomorphic encryption., and . BMC Medical Informatics Decis. Mak., 15-S (5): S3 (December 2015)Evaluation of vicinity-based hidden Markov models for genotype imputation., , , and . BMC Bioinform., 23 (1): 356 (2022)Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data., , and . IEEE Trans. Inf. Forensics Secur., 11 (1): 188-199 (2016)Secure and Differentially Private Logistic Regression for Horizontally Distributed Data., , , and . IEEE Trans. Inf. Forensics Secur., (2020)Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts., , , and . IACR Cryptol. ePrint Arch., (2020)