Author of the publication

Private Verification in Multi-stakeholder Environment and its Application to Stable Matching.

, , , and . SN Comput. Sci., 5 (3): 309 (March 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Door Access Control System with Mobile Phones., , , and . PWC, volume 245 of IFIP, page 230-240. Springer, (2007)An Anonymous Authentication Protocol with Single-database PIR., , , , and . AISC, volume 116 of CRPIT, page 3-8. Australian Computer Society, (2011)Security and Trust Issues on Digital Supply Chain., , and . DASC/PiCom/DataCom/CyberSciTech, page 338-343. IEEE, (2019)The Effects of Nudging a Privacy Setting Suggestion Algorithm's Outputs on User Acceptability., , , , and . J. Inf. Process., (2019)Explainable Machine Learning for Default Privacy Setting Prediction., , , and . IEEE Access, (2021)Effects of environmental control before sleeping on autonomic nervous activity and sleep: A pilot study., , , , , , , and . J. Ambient Intell. Smart Environ., 15 (2): 165-178 (2023)Default Privacy Setting Prediction by Grouping User's Attributes and Settings Preferences., , , and . DPM/CBT@ESORICS, volume 10436 of Lecture Notes in Computer Science, page 107-123. Springer, (2017)Almost fully anonymous attribute-based group signatures with verifier-local revocation and member registration from lattice assumptions., , , , and . Theor. Comput. Sci., (2021)TRANSDIRE: data-driven direct reprogramming by a pioneer factor-guided trans-omics approach., , , , , and . Bioinform., 38 (10): 2839-2846 (2022)Daily Mental Health Monitoring from Speech: A Real-World Japanese Dataset and Multitask Learning Analysis., , , , , , , , , and 5 other author(s). ICASSP, page 1-5. IEEE, (2023)