Author of the publication

Multi-party Updatable Delegated Private Set Intersection.

, , , and . Financial Cryptography, volume 13411 of Lecture Notes in Computer Science, page 100-119. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Future of Enterprise Groupware Applications., , , , and . ICEIS, page 525-532. (1999)Investigating Mobile Instant Messaging Phishing: A Study into User Awareness and Preventive Measures., , and . HCI (35), volume 14045 of Lecture Notes in Computer Science, page 381-398. Springer, (2023)Efficient Delegated Private Set Intersection on Outsourced Private Datasets., , , and . IEEE Trans. Dependable Secur. Comput., 16 (4): 608-624 (2019)A Middleware for Pervasive Situation-Awareness., and . DAIS, volume 7272 of Lecture Notes in Computer Science, page 148-161. Springer, (2012)A Management Architecture for Measuring and Monitoring the Behavior of Digital Libraries., , and . ECDL, volume 1513 of Lecture Notes in Computer Science, page 95-114. Springer, (1998)The Virtues Architecture: A Software Infrastructure for Business-to-Business E-Commerce., , , , and . ICEIS, page 461-466. (2000)Feather: Lightweight Multi-party Updatable Delegated Private Set Intersection., , and . IACR Cryptology ePrint Archive, (2020)Semantic Trading: Tackling Interoperability Problems During System Integration., and . ECOOP Workshops, volume 1743 of Lecture Notes in Computer Science, page 9. Springer, (1999)A model and architecture for situation determination., , and . CASCON, page 380. IBM, (2006)Gathering Experience in Trust-Based Interactions., and . iTrust, volume 3986 of Lecture Notes in Computer Science, page 62-76. Springer, (2006)