Author of the publication

Privacy for the Stock Market.

. Financial Cryptography, volume 2339 of Lecture Notes in Computer Science, page 259-278. Springer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Implementation of Lattice-Based Program Obfuscators for Point Functions., , , , and . HPCS, page 761-768. IEEE, (2017)On Single-Server Delegation Without Precomputation., and . SECRYPT, page 540-547. SCITEPRESS, (2023)Securing Weakly-Dominating Virtual Backbones in Mobile Ad Hoc Networks., , , and . WOWMOM, page 576-580. IEEE Computer Society, (2006)InFilter: Predictive Ingress Filtering to Detect Spoofed IP Traffic., , , and . ICDCS Workshops, page 99-106. IEEE Computer Society, (2005)Data Forensics Constructions from Cryptographic Hashing and Coding., and . IWDW, volume 7128 of Lecture Notes in Computer Science, page 494-509. Springer, (2011)Implementing Conjunction Obfuscation Under Entropic Ring LWE., , , , , , , and . IEEE Symposium on Security and Privacy, page 354-371. IEEE Computer Society, (2018)Encrypted-Input Obfuscation of Image Classifiers., , , , , and . DBSec, volume 12840 of Lecture Notes in Computer Science, page 136-156. Springer, (2021)How to Forget a Secret., , , and . STACS, volume 1563 of Lecture Notes in Computer Science, page 500-509. Springer, (1999)Proofs of Membership vs. Proofs of Knowledge., and . CCC, page 34-45. IEEE Computer Society, (1998)Foundations of Optical Encryption: A Candidate Short-Key Scheme., , and . NSS, volume 9408 of Lecture Notes in Computer Science, page 359-367. Springer, (2015)