Author of the publication

Secure Distributed Membership Tests via Secret Sharing: How to Hide Your Hostile Hosts Harnessing Shamir Secret Sharing.

, , , , , and . CoRR, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tracking Network Events with Write Optimized Data Structures: The Design and Implementation of TWIAD: The Write-Optimized IP Address Database., , , , , and . CoRR, (2015)The Locality-First Strategy for Developing Efficient Multicore Algorithm.. Massachusetts Institute of Technology, USA, (2022)A Parallel Packed Memory Array to Store Dynamic Graphs., and . ALENEX, page 31-45. SIAM, (2021)CPMA: An Efficient Batch-Parallel Compressed Set Without Pointers., , , and . PPoPP, page 348-363. ACM, (2024)Closing the Gap Between Cache-oblivious and Cache-adaptive Analysis., , , , , , , , and . SPAA, page 63-73. ACM, (2020)Tracking Network Events with Write Optimized Data Structures., , , , , and . BADGERS@RAID, page 1-7. IEEE, (2015)Secure distributed membership tests via secret sharing: How to hide your hostile hosts: Harnessing shamir secret sharing., , , , , and . ICNC, page 1-6. IEEE Computer Society, (2016)A Fill Estimation Algorithm for Sparse Matrices and Tensors in Blocked Formats., , and . IPDPS, page 546-556. IEEE Computer Society, (2018)BP-tree: Overcoming the Point-Range Operation Tradeoff for In-Memory B-trees., , , , and . Proc. VLDB Endow., 16 (11): 2976-2989 (2023)Prostate cancer detection using residual networks., , , and . Int. J. Comput. Assist. Radiol. Surg., 14 (10): 1647-1650 (2019)