Author of the publication

Discrepancy-Sensitive Dynamic Fractional Cascading, Dominated Maxima Searching, and 2-d Nearest Neighbors in Any Minkowski Metric

, , , and . CoRR, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Succinct representation of flexible and privacy-preserving access rights., and . VLDB J., 15 (4): 334-354 (2006)Secure Outsourcing of DNA Searching via Finite Automata., and . DBSec, volume 6166 of Lecture Notes in Computer Science, page 49-64. Springer, (2010)Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation., and . Proc. Priv. Enhancing Technol., 2016 (4): 144-164 (2016)Efficient Dynamic Provable Possession of Remote Data via Update Trees., and . ACM Trans. Storage, 12 (2): 9:1-9:45 (2016)PICCO: a general-purpose compiler for private distributed computation., , and . ACM Conference on Computer and Communications Security, page 813-826. ACM, (2013)Biometric-Based Non-transferable Anonymous Credentials., and . ICICS, volume 5927 of Lecture Notes in Computer Science, page 165-180. Springer, (2009)Deniable cloud storage: sharing files via public-key deniability., , and . WPES, page 31-42. ACM, (2010)On the (Non-)reusability of Fuzzy Sketches and Extractors and Security in the Computational Setting., and . SECRYPT, page 68-77. SciTePress, (2011)Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning., , and . IACR Cryptol. ePrint Arch., (2020)Dynamic and efficient key management for access hierarchies., , and . CCS, page 190-202. ACM, (2005)