Author of the publication

Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases.

, , , , and . Privacy Enhancing Technologies, volume 5672 of Lecture Notes in Computer Science, page 185-201. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Auditable, Anonymous Electronic Cash Extended Abstract., and . CRYPTO, volume 1666 of Lecture Notes in Computer Science, page 555-572. Springer, (1999)Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems., and . Financial Cryptography, volume 1648 of Lecture Notes in Computer Science, page 46-61. Springer, (1999)Protecting Mobile Agents Against Malicious Hosts., and . Mobile Agents and Security, volume 1419 of Lecture Notes in Computer Science, page 44-60. Springer, (1998)Efficient Accumulators without Trapdoor Extended Abstracts.. ICICS, volume 1726 of Lecture Notes in Computer Science, page 252-262. Springer, (1999)Scalable, accountable privacy management for large organizations., , , , , , , and . EDOCW, page 168-175. IEEE Computer Society, (2009)If Piracy Is the Problem, Is DRM the Answer?, , , , and . Digital Rights Management, volume 2770 of Lecture Notes in Computer Science, Springer, (2003)UX Aspects of Threat Information Sharing Platforms: An Examination & Lessons Learned Using Personas., and . WISCS@CCS, page 51-59. ACM, (2015)Deniable payments and electronic campaign finance., and . CFP, page 67-68. ACM, (2000)Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases., , , , and . Privacy Enhancing Technologies, volume 5672 of Lecture Notes in Computer Science, page 185-201. Springer, (2009)Efficient signature schemes supporting redaction, pseudonymization, and data deidentification., , , , , , , and . AsiaCCS, page 353-362. ACM, (2008)