Author of the publication

DEMO: Integrating MPC in Big Data Workflows.

, , , , and . ACM Conference on Computer and Communications Security, page 1844-1846. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DEMO: Integrating MPC in Big Data Workflows., , , , and . ACM Conference on Computer and Communications Security, page 1844-1846. ACM, (2016)Batched Differentially Private Information Retrieval., , , and . USENIX Security Symposium, page 3327-3344. USENIX Association, (2022)Crypto Crumple Zones: Enabling Limited Access without Mass Surveillance., and . EuroS&P, page 288-306. IEEE, (2018)Obfuscation of Hyperplane Membership., , and . TCC, volume 5978 of Lecture Notes in Computer Science, page 72-89. Springer, (2010)Two-Server Distributed ORAM with Sublinear Computation and Constant Rounds., and . Public Key Cryptography (2), volume 12711 of Lecture Notes in Computer Science, page 499-527. Springer, (2021)Revealing the Unseen: How to Expose Cloud Usage While Protecting User Privacy., , and . ICDM Workshops, page 1011-1016. IEEE Computer Society, (2017)Brief Announcement: Federated Code Auditing and Delivery for MPC., , , and . SSS, volume 10616 of Lecture Notes in Computer Science, page 298-302. Springer, (2017)Secret Sharing MPC on FPGAs in the Datacenter., , , , and . FPL, page 236-242. IEEE, (2020)QueryShield: Cryptographically Secure Analytics in the Cloud., , , , , , , and . SIGMOD Conference Companion, page 436-439. ACM, (2024)TVA: A multi-party computation system for secure and expressive time series analytics., , , , and . USENIX Security Symposium, page 5395-5412. USENIX Association, (2023)