Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Sharing of Partially Homomorphic Encrypted IoT Data., , , , and . SenSys, page 29:1-29:14. ACM, (2017)TimeCrypt: Encrypted Data Stream Processing at Scale with Cryptographic Access Control., , , , and . NSDI, page 835-850. USENIX Association, (2020)Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams., , , and . USENIX Security Symposium, page 2469-2486. USENIX Association, (2020)Droplet: Decentralized Authorization for IoT Data Streams., , , , and . CoRR, (2018)Towards Blockchain-based Auditable Storage and Sharing of IoT Data., , , and . CCSW, page 45-50. ACM, (2017)Privacy-Centric Systems for Stream Data Processing.. ETH Zurich, Zürich, Switzerland, (2022)base-search.net (ftethz:oai:www.research-collection.ethz.ch:20.500.11850/594164).RoFL: Attestable Robustness for Secure Federated Learning., , , , and . CoRR, (2021)VF-PS: How to Select Important Participants in Vertical Federated Learning, Efficiently and Securely?, , , , , , , and . NeurIPS, (2022)Talos a Platform for Processing Encrypted IoT Data: Demo Abstract., , and . SenSys, page 308-309. ACM, (2016)RoFL: Robustness of Secure Federated Learning., , , , and . SP, page 453-476. IEEE, (2023)