Author of the publication

Privacy for the Stock Market.

. Financial Cryptography, volume 2339 of Lecture Notes in Computer Science, page 259-278. Springer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Forensics Constructions from Cryptographic Hashing and Coding., and . IWDW, volume 7128 of Lecture Notes in Computer Science, page 494-509. Springer, (2011)Securing Weakly-Dominating Virtual Backbones in Mobile Ad Hoc Networks., , , and . WOWMOM, page 576-580. IEEE Computer Society, (2006)Implementing Conjunction Obfuscation Under Entropic Ring LWE., , , , , , , and . IEEE Symposium on Security and Privacy, page 354-371. IEEE Computer Society, (2018)InFilter: Predictive Ingress Filtering to Detect Spoofed IP Traffic., , , and . ICDCS Workshops, page 99-106. IEEE Computer Society, (2005)Practical Implementation of Lattice-Based Program Obfuscators for Point Functions., , , , and . HPCS, page 761-768. IEEE, (2017)On Single-Server Delegation Without Precomputation., and . SECRYPT, page 540-547. SCITEPRESS, (2023)A Group Testing Approach to Improved Corruption Localizing Hashing., and . IACR Cryptology ePrint Archive, (2011)Secure Delegation to a Single Malicious Server: Exponentiation in RSA-type Groups., , , and . CNS, page 1-9. IEEE, (2019)Encrypted-Input Obfuscation of Image Classifiers., , , , , and . DBSec, volume 12840 of Lecture Notes in Computer Science, page 136-156. Springer, (2021)Equivocable and Extractable Commitment Schemes.. SCN, volume 2576 of Lecture Notes in Computer Science, page 74-87. Springer, (2002)