Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Universally Composable Oblivious Transfer Protocol based on the RLWE Assumption., , , and . IACR Cryptology ePrint Archive, (2018)UC-Commitment Schemes with Phase-Adaptive Security from Trapdoor Functions., , and . IACR Cryptology ePrint Archive, (2019)Challenges for multimodal interfaces towards anyone anywhere accessibility: a position paper.. Workshop on Universal Accessibility of Ubiquitous Computing, page 26-27. ACM, (2001)Studydesk: semi-immersive volumetric data analysis., , , , and . GRAPHITE, page 251-252. ACM, (2003)Two-Round Oblivious Linear Evaluation from Learning with Errors., , and . IACR Cryptol. ePrint Arch., (2020)Laconic Private Set Intersection and Applications., , , , , and . TCC (3), volume 13044 of Lecture Notes in Computer Science, page 94-125. Springer, (2021)Blink: observing thin slices of behavior to determine users' expectation towards task difficulty., , , , , , and . CHI Extended Abstracts, page 2299-2304. ACM, (2011)Emotional interaction.. CHI Extended Abstracts, page 676-677. ACM, (2003)Game-based interaction technology for informal education in public settings., , , , , , and . SIGGRAPH Educators Program, page 23. ACM, (2005)Multiparty Cardinality Testing for Threshold Private Set Intersection., , and . IACR Cryptol. ePrint Arch., (2020)