Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient trace and revoke schemes., and . Int. J. Inf. Sec., 9 (6): 411-424 (2010)Rank Aggregation Methods for the Web, , , and . Proceedings of the 10th International World Wide Web Conference (WWW-01), page 613--622. Hong Kong, China, ACM, (2001)Optimal File Sharing in Distributed Networks., and . SIAM J. Comput., 24 (1): 158-183 (1995)Oblivious Polynomial Evaluation., and . SIAM J. Comput., 35 (5): 1254-1281 (2006)Bloom Filters in Adversarial Environments., and . CoRR, (2014)How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior., , and . IACR Cryptology ePrint Archive, (2018)Primary-Secondary-Resolver Membership Proof Systems., and . IACR Cryptology ePrint Archive, (2014)Optimal Aggregation Algorithms for Middleware., , and . PODS, ACM, (2001)Games for extracting randomness., and . SOUPS, ACM, (2009)Anti-presistence: history independent data structures., and . STOC, page 492-501. ACM, (2001)