Author of the publication

Outsourcing Medical Dataset Analysis: A Possible Solution.

, , and . Financial Cryptography, volume 10322 of Lecture Notes in Computer Science, page 98-123. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Don't Talk to Strangers - On the Challenges of Intelligent Vehicle Authentication., and . VEHITS, page 522-528. SciTePress, (2018)Efficient Proofs of Software Exploitability for Real-world Processors., , , , , and . Proc. Priv. Enhancing Technol., 2023 (1): 627-640 (January 2023)A Protocol for Privately Reporting Ad Impressions at Scale., , and . ACM Conference on Computer and Communications Security, page 1591-1601. ACM, (2016)Keys under doormats: mandating insecurity by requiring government access to all data and communications., , , , , , , , , and 5 other author(s). J. Cybersecur., 1 (1): 69-79 (2015)Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers., , and . NDSS, The Internet Society, (2019)Charm: A Framework for Rapidly Prototyping Cryptosystems., , and . NDSS, The Internet Society, (2012)Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage., , , , and . USENIX Security Symposium, page 655-672. USENIX Association, (2016)Blogging birds: Generating narratives about reintroduced species to promote public engagement., , , , and . INLG, page 120-124. The Association for Computer Linguistics, (2012)Fluid MPC: Secure Multiparty Computation with Dynamic Participants., , , , and . CRYPTO (2), volume 12826 of Lecture Notes in Computer Science, page 94-123. Springer, (2021)Downgrade Resilience in Key-Exchange Protocols., , , , , and . IEEE Symposium on Security and Privacy, page 506-525. IEEE Computer Society, (2016)