Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Comment on Privacy-Preserving Scalar Product Protocols as Proposed in "SPOC"., and . IEEE Trans. Parallel Distributed Syst., 31 (3): 543-546 (2020)Trustworthy AI Inference Systems: An Industry Research View., , , , , , , , , and 18 other author(s). CoRR, (2020)Privacy-Preserving Speaker Recognition with Cohort Score Normalisation., , , , , , , and . INTERSPEECH, page 2868-2872. ISCA, (2019)MAPLE: MArkov Process Leakage attacks on Encrypted Search., , , , , and . Proc. Priv. Enhancing Technol., 2024 (1): 430-446 (January 2024)Privacy-preserving PLDA speaker verification using outsourced secure computation., , , , and . Speech Commun., (2019)A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC"., and . CoRR, (2019)SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data., , , , , and . EuroS&P, page 90-108. IEEE, (2022)Data Protection Law and Multi-Party Computation: Applications to Information Exchange between Law Enforcement Agencies., , , and . WPES@CCS, page 69-82. ACM, (2022)Examining Leakage from Access Counts in ORAM Constructions., , and . Krypto-Tag, Gesellschaft für Informatik e.V. / FG KRYPTO, (2018)Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data., , , , , and . IACR Cryptol. ePrint Arch., (2021)