Author of the publication

Secure Computation of MIPS Machine Code.

, , , and . ESORICS (2), volume 9879 of Lecture Notes in Computer Science, page 99-117. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Computation of MIPS Machine Code., , , and . IACR Cryptology ePrint Archive, (2015)Fitting linear models. Lecture notes in statistics Springer, New York u.a., (1982)Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence Database., , , and . DBSec, volume 8566 of Lecture Notes in Computer Science, page 339-355. Springer, (2014)Secure Computation of MIPS Machine Code., , , and . ESORICS (2), volume 9879 of Lecture Notes in Computer Science, page 99-117. Springer, (2016)Application of multi-scale singular vector decomposition to vessel classification in overhead satellite imagery., , , , and . ICDIP, volume 9631 of SPIE Proceedings, page 963108. SPIE, (2015)Encrypted-Input Program Obfuscation: Simultaneous Security Against White-Box and Black-Box Attacks., , and . CNS, page 1-9. IEEE, (2020)Practical and privacy-preserving information retrieval from a database table., , , and . J. Comput. Secur., 24 (4): 479-506 (2016)Privacy-protecting index for outsourced databases., , , and . ICDE Workshops, page 83-87. IEEE Computer Society, (2013)Centralized multi-scale singular value decomposition for feature construction in LIDAR image classification problems., , , , and . AIPR, page 1-6. IEEE Computer Society, (2012)Using Weak Supervision and Data Augmentation in Question Answering., , , , and . CoRR, (2023)