Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Private computation of polynomials over networks., , and . Syst. Control. Lett., (2022)Formal analysis of XACML policies using SMT., , , and . Comput. Secur., (2017)Poster: Privacy-preserving Genome Analysis using Verifiable Off-Chain Computation., , , and . CCS, page 3475-3477. ACM, (2022)Verifiable Privacy-Preserving Computing., , and . CoRR, (2023)Privacy-preserving logistic regression with secret sharing., , and . BMC Medical Informatics Decis. Mak., 22 (1): 89 (2022)SecFlow: Adaptive Security-Aware Workflow Management System in Multi-cloud Environments., and . EDOC Workshops, volume 498 of Lecture Notes in Business Information Processing, page 281-297. Springer, (2023)KotlinDetector: Towards Understanding the Implications of Using Kotlin in Android Applications., , and . MOBILESoft@ICSE, page 84-93. IEEE, (2021)VPAS: Publicly Verifiable and Privacy-Preserving Aggregate Statistics on Distributed Datasets., , , and . CoRR, (2024)Continuous Fuzzing: A Study of the Effectiveness and Scalability of Fuzzing in CI/CD Pipelines., , , , and . SBFT, page 25-32. IEEE, (2023)Federated Synthetic Data Generation with Stronger Security Guarantees., , , and . SACMAT, page 31-42. ACM, (2023)