Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Transparent Polynomial Commitments for zk-SNARKs., , , , , and . ESORICS (3), volume 14346 of Lecture Notes in Computer Science, page 348-366. Springer, (2023)Finding association rules of cis-regulatory elements involved in alternative splicing., , and . ACM Southeast Regional Conference, page 232-237. ACM, (2007)Efficient Verifiable Image Redacting based on zk-SNARKs., , , , and . IACR Cryptol. ePrint Arch., (2020)Efficient Dynamic Load Balancing for Association Rule Mining., , , and . PDPTA, page 886-894. CSREA Press, (2002)Competition between group interactions and nonlinearity in voter dynamics on hypergraphs., , , , , and . CoRR, (2024)ZOS: Zero Overhead Scan for Systolic Array-based AI accelerator., , , and . ISOCC, page 360-361. IEEE, (2022)Compress Multiple Ciphertexts Using ElGamal Encryption Schemes., , and . IACR Cryptology ePrint Archive, (2012)Reactivation of Fear Memory Renders Consolidated Amygdala Synapses Labile, , , , , , , , , and . J. Neurosci., 30 (28): 9631--9640 (Jul 14, 2010)Privacy-preserving web search., and . ICUFN, page 480-481. IEEE, (2012)Mediated aggregate signature schemes in wireless sensor networks., , , and . SECON Workshops, page 7-12. IEEE, (2015)