Author of the publication

Reliable medical recommendation systems with patient privacy.

, , , and . ACM Trans. Intell. Syst. Technol., 4 (4): 67:1-67:31 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Succinct representation of flexible and privacy-preserving access rights., and . VLDB J., 15 (4): 334-354 (2006)Secure Outsourcing of DNA Searching via Finite Automata., and . DBSec, volume 6166 of Lecture Notes in Computer Science, page 49-64. Springer, (2010)Deniable cloud storage: sharing files via public-key deniability., , and . WPES, page 31-42. ACM, (2010)On the (Non-)reusability of Fuzzy Sketches and Extractors and Security in the Computational Setting., and . SECRYPT, page 68-77. SciTePress, (2011)Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation., and . Proc. Priv. Enhancing Technol., 2016 (4): 144-164 (2016)PICCO: a general-purpose compiler for private distributed computation., , and . ACM Conference on Computer and Communications Security, page 813-826. ACM, (2013)Efficient Dynamic Provable Possession of Remote Data via Update Trees., and . ACM Trans. Storage, 12 (2): 9:1-9:45 (2016)Biometric-Based Non-transferable Anonymous Credentials., and . ICICS, volume 5927 of Lecture Notes in Computer Science, page 165-180. Springer, (2009)Secure and Accurate Summation of Many Floating-Point Numbers., , and . CoRR, (2023)Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning., , and . IACR Cryptol. ePrint Arch., (2020)