Author of the publication

Poly-Logarithmic Range Queries on Encrypted Data with Small Leakage.

, and . CCSW, page 23-34. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Biometric Verification Secure Against Malicious Adversaries., , , , , and . CoRR, (2021)A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents., , and . CoRR, (2023)SAGMA: Secure Aggregation Grouped by Multiple Attributes., , and . SIGMOD Conference, page 587-601. ACM, (2020)Gesture meaning needs speech meaning to denote - A case of speech-gesture meaning interaction., , and . FADLI@ESSLLI, volume 1863 of CEUR Workshop Proceedings, page 42-46. CEUR-WS.org, (2017)I Still Know What You Watched Last Sunday: Privacy of the HbbTV Protocol in the European Smart TV Landscape., , , , and . NDSS, The Internet Society, (2023)Hybrid biometric template protection: Resolving the agony of choice between bloom filters and homomorphic encryption., , , and . IET Biom., 11 (5): 430-444 (September 2022)Fast and Accurate Likelihood Ratio-Based Biometric Verification Secure Against Malicious Adversaries., , , , , and . IEEE Trans. Inf. Forensics Secur., (2021)Repeated Knowledge Distillation with Confidence Masking to Mitigate Membership Inference Attacks., , , , , , and . AISec@CCS, page 13-24. ACM, (2022)Multiplication-Free Biometric Recognition for Faster Processing under Encryption., , , and . IJCB, page 1-9. IEEE, (2022)Practical Framework for Advanced Quality-based Process Control in Interlinked Manufacturing Processes., , and . IEEM, page 511-515. IEEE, (2019)