Author of the publication

Efficient Correlated Action Selection.

, , , and . Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, page 296-310. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the (Non-)reusability of Fuzzy Sketches and Extractors and Security in the Computational Setting., and . SECRYPT, page 68-77. SciTePress, (2011)Biometric-Based Non-transferable Anonymous Credentials., and . ICICS, volume 5927 of Lecture Notes in Computer Science, page 165-180. Springer, (2009)Dynamic and efficient key management for access hierarchies., , and . CCS, page 190-202. ACM, (2005)Deniable cloud storage: sharing files via public-key deniability., , and . WPES, page 31-42. ACM, (2010)Secure Outsourcing of DNA Searching via Finite Automata., and . DBSec, volume 6166 of Lecture Notes in Computer Science, page 49-64. Springer, (2010)PICCO: a general-purpose compiler for private distributed computation., , and . ACM Conference on Computer and Communications Security, page 813-826. ACM, (2013)Achieving Full Security in Privacy-Preserving Data Mining.. SocialCom/PASSAT, page 925-934. IEEE Computer Society, (2011)Privacy Preserving Biometric Authentication for Fingerprints and Beyond., and . CODASPY, page 367-378. ACM, (2024)Efficient techniques for realizing geo-spatial access control., , and . AsiaCCS, page 82-92. ACM, (2007)Understanding Information Disclosure from Secure Computation Output: A Study of Average Salary Computation., , and . CoRR, (2022)