Author of the publication

Practical Privacy-Preserving K-means Clustering.

, , and . Proc. Priv. Enhancing Technol., 2020 (4): 414-433 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PSI from PaXoS: Fast, Malicious Private Set Intersection., , , and . EUROCRYPT (2), volume 12106 of Lecture Notes in Computer Science, page 739-767. Springer, (2020)Two-Stage Robust Edge Service Placement and Sizing under Demand Uncertainty., , , and . CoRR, (2020)Delegated Private Matching for Compute., , , , , and . IACR Cryptol. ePrint Arch., (2023)Toward A Practical Multi-party Private Set Union., , and . IACR Cryptol. ePrint Arch., (2023)MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge., and . IACR Cryptol. ePrint Arch., (2021)DUPLO: Unifying Cut-and-Choose for Garbled Circuits., , , , and . CCS, page 3-20. ACM, (2017)A Fairness-Aware Attacker-Defender Model for Optimal Edge Network Operation and Protection., , , and . IEEE Netw. Lett., 5 (2): 120-124 (2023)Catalic: Delegated PSI Cardinality with Applications to Contact Tracing., , and . ASIACRYPT (3), volume 12493 of Lecture Notes in Computer Science, page 870-899. Springer, (2020)Scalable Private Set Union from Symmetric-Key Techniques., , , and . ASIACRYPT (2), volume 11922 of Lecture Notes in Computer Science, page 636-666. Springer, (2019)SWiM: Secure Wildcard Pattern Matching From OT Extension., , and . IACR Cryptology ePrint Archive, (2017)