Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Private computation of polynomials over networks., , and . Syst. Control. Lett., (2022)Poster: Privacy-preserving Genome Analysis using Verifiable Off-Chain Computation., , , and . CCS, page 3475-3477. ACM, (2022)Formal analysis of XACML policies using SMT., , , and . Comput. Secur., (2017)Verifiable Privacy-Preserving Computing., , and . CoRR, (2023)KotlinDetector: Towards Understanding the Implications of Using Kotlin in Android Applications., , and . MOBILESoft@ICSE, page 84-93. IEEE, (2021)Privacy-preserving logistic regression with secret sharing., , and . BMC Medical Informatics Decis. Mak., 22 (1): 89 (2022)Continuous Fuzzing: A Study of the Effectiveness and Scalability of Fuzzing in CI/CD Pipelines., , , , and . SBFT, page 25-32. IEEE, (2023)SecFlow: Adaptive Security-Aware Workflow Management System in Multi-cloud Environments., and . EDOC Workshops, volume 498 of Lecture Notes in Business Information Processing, page 281-297. Springer, (2023)VPAS: Publicly Verifiable and Privacy-Preserving Aggregate Statistics on Distributed Datasets., , , and . CoRR, (2024)Federated Synthetic Data Generation with Stronger Security Guarantees., , , and . SACMAT, page 31-42. ACM, (2023)