Author of the publication

Cliptography: Clipping the Power of Kleptographic Attacks.

, , , and . ASIACRYPT (2), volume 10032 of Lecture Notes in Computer Science, page 34-64. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Supervised Spatio-Temporal Contrastive Learning Framework with Optimal Skeleton Subgraph Topology for Human Action Recognition., , , , , , and . ICONIP (10), volume 1964 of Communications in Computer and Information Science, page 162-175. Springer, (2023)Cliptography: Clipping the Power of Kleptographic Attacks., , , and . ASIACRYPT (2), volume 10032 of Lecture Notes in Computer Science, page 34-64. (2016)Poster: privacy-preserving profile similarity computation in online social networks., , and . CCS, page 793-796. ACM, (2011)The Price of Privacy in Collaborative Learning., , and . CCS, page 2261-2263. ACM, (2018)Dumbo: Faster Asynchronous BFT Protocols., , , , and . CCS, page 803-818. ACM, (2020)A Probabilistic View of Neighborhood-Based Recommendation Methods., and . ICDM Workshops, page 14-20. IEEE Computer Society, (2016)Censorship Resistant Decentralized IoT Management Systems., , and . MobiQuitous, page 454-459. ACM, (2018)Privacy-preserving Hybrid Recommender System., and . SCC@AsiaCCS, page 59-66. ACM, (2017)Dumbo-MVBA: Optimal Multi-Valued Validated Asynchronous Byzantine Agreement, Revisited., , , and . PODC, page 129-138. ACM, (2020)Distributed Parameter Generation for Bilinear Diffie Hellman Exponentiation and Applications., , and . ISC, volume 9290 of Lecture Notes in Computer Science, page 548-567. Springer, (2015)