Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiple Noisy Private Remote Source Observations for Secure Function Computation., , and . IACR Cryptol. ePrint Arch., (2022)Federated Learning with Local Differential Privacy: Trade-Offs Between Privacy, Utility, and Communication., , and . ICASSP, page 2650-2654. IEEE, (2021)Low-Complexity and Reliable Transforms for Physical Unclonable Functions., and . ICASSP, page 2807-2811. IEEE, (2020)Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication., , and . ISIT, page 874-878. IEEE, (2020)Nested Tailbiting Convolutional Codes for Secrecy, Privacy, and Storage., , , and . IH&MMSec, page 79-89. ACM, (2020)Quality of Service Guarantees for Physical Unclonable Functions., , and . WIFS, page 1-6. IEEE, (2021)Secure and Private Source Coding with Private Key and Decoder Side Information., , , and . ITW, page 226-231. IEEE, (2022)Transmitter Actions for Secure Integrated Sensing and Communication., , and . IACR Cryptol. ePrint Arch., (2024)Randomized Distributed Function Computation with Semantic Communications: Applications to Privacy.. IACR Cryptol. ePrint Arch., (2024)Concatenated Classic and Neural (CCN) Codes: ConcatenatedAE., , and . WCNC, page 1-6. IEEE, (2023)