Author of the publication

GuardML: Efficient Privacy-Preserving Machine Learning Services Through Hybrid Homomorphic Encryption.

, , , , and . SAC, page 953-962. ACM, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Footsteps in the fog: Certificateless fog-based access control., , and . Comput. Secur., (2022)A break-glass protocol based on ciphertext-policy attribute-based encryption to access medical records in the cloud., , , , , , and . Ann. des Télécommunications, 75 (3-4): 103-119 (2020)Do Not Tell Me What I Cannot Do! (The Constrained Device Shouted under the Cover of the Fog): Implementing Symmetric Searchable Encryption on Constrained Devices., , , and . IoTBDS, page 119-129. SCITEPRESS, (2020)GuardML: Efficient Privacy-Preserving Machine Learning Services Through Hybrid Homomorphic Encryption., , , , and . SAC, page 953-962. ACM, (2024)Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives (extended version)., , and . IACR Cryptol. ePrint Arch., (2022)Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors., , , and . DBSec, volume 13383 of Lecture Notes in Computer Science, page 279-299. Springer, (2022)Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors (extended version)?, , , and . IACR Cryptol. ePrint Arch., (2022)Do not tell me what I cannot do! (The constrained device shouted under the cover of the fog): Implementing Symmetric Searchable Encryption on Constrained Devices (Extended Version)., , , and . IACR Cryptology ePrint Archive, (2020)A Secure Bandwidth-Efficient Treatment for Dropout-Resistant Time-Series Data Aggregation., , , and . PerCom Workshops, page 640-645. IEEE, (2023)Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives., , and . SecureComm, volume 462 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 353-370. Springer, (2022)