Author of the publication

A Study from the Data Anonymization Competition Pwscup 2015.

, , , , , and . DPM/QASA@ESORICS, volume 9963 of Lecture Notes in Computer Science, page 230-237. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing a Location Trace Anonymization Contest., , , , , , , , , and 6 other author(s). Proc. Priv. Enhancing Technol., 2023 (1): 225-243 (January 2023)Strategy-Proof Approximation Algorithms for the Stable Marriage Problem with Ties and Incomplete Lists., , and . ISAAC, volume 149 of LIPIcs, page 9:1-9:14. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2019)Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority., , , , and . ACISP, volume 10946 of Lecture Notes in Computer Science, page 64-82. Springer, (2018)Refined Computational Complexities of Hospitals/Residents Problem with Regional Caps., and . CoRR, (2021)Fast Large-Scale Honest-Majority MPC for Malicious Adversaries., , , , , , and . J. Cryptol., 36 (3): 15 (July 2023)Practically Efficient Multi-party Sorting Protocols from Comparison Sort Algorithms., , , , and . ICISC, volume 7839 of Lecture Notes in Computer Science, page 202-216. Springer, (2012)Communication-Efficient Inner Product Private Join and Compute with Cardinality., , , , and . AsiaCCS, page 678-688. ACM, (2023)Practical Password-Based Authentication Protocol for Secret Sharing Based Multiparty Computation., , , and . CANS, volume 9476 of Lecture Notes in Computer Science, page 179-196. Springer, (2015)Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation., , , , , , , and . ACISP, volume 11547 of Lecture Notes in Computer Science, page 343-361. Springer, (2019)Efficient Secure Multi-Party Protocols for Decision Tree Classification., , , and . ACISP, volume 11547 of Lecture Notes in Computer Science, page 362-380. Springer, (2019)