Author of the publication

Poster: Privacy-preserving Genome Analysis using Verifiable Off-Chain Computation.

, , , and . CCS, page 3475-3477. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-preserving logistic regression with secret sharing., , and . BMC Medical Informatics Decis. Mak., 22 (1): 89 (2022)Verifiable Privacy-Preserving Computing., , and . CoRR, (2023)KotlinDetector: Towards Understanding the Implications of Using Kotlin in Android Applications., , and . MOBILESoft@ICSE, page 84-93. IEEE, (2021)SecFlow: Adaptive Security-Aware Workflow Management System in Multi-cloud Environments., and . EDOC Workshops, volume 498 of Lecture Notes in Business Information Processing, page 281-297. Springer, (2023)VPAS: Publicly Verifiable and Privacy-Preserving Aggregate Statistics on Distributed Datasets., , , and . CoRR, (2024)Continuous Fuzzing: A Study of the Effectiveness and Scalability of Fuzzing in CI/CD Pipelines., , , , and . SBFT, page 25-32. IEEE, (2023)Privacy-Preserving Aggregation for Decentralized Learning with Byzantine-Robustness., , , and . CoRR, (2024)Formal analysis of XACML policies using SMT., , , and . Comput. Secur., (2017)Poster: Privacy-preserving Genome Analysis using Verifiable Off-Chain Computation., , , and . CCS, page 3475-3477. ACM, (2022)Private computation of polynomials over networks., , and . Syst. Control. Lett., (2022)