Author of the publication

Contact Tracing by Giant Data Collectors: Opening Pandora's Box of Threats to Privacy, Sovereignty and National Security

, , , , , , , , , , , and . University works, EPFL, Switzerland ; Inria, France ; JMU Würzburg, Germany ; University of Salerno, Italy ; base23, Geneva, Switzerland ; Technical University of Darmstadt, Germany, (December 2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Selene to Verify Your Vote in JCJ., , , and . Financial Cryptography Workshops, volume 10323 of Lecture Notes in Computer Science, page 385-403. Springer, (2017)Non-Interactive Zero Knowledge Proofs in the Random Oracle Model., and . IACR Cryptology ePrint Archive, (2019)On the Possibility of Non-interactive E-Voting in the Public-Key Setting., , and . Financial Cryptography Workshops, volume 9604 of Lecture Notes in Computer Science, page 193-208. Springer, (2016)"The Simplest Protocol for Oblivious Transfer" Revisited., , and . IACR Cryptology ePrint Archive, (2017)Mergeable Functional Encryption., and . IACR Cryptology ePrint Archive, (2015)"The simplest protocol for oblivious transfer" revisited., , and . Inf. Process. Lett., (2020)Simulation-Based Secure Functional Encryption in the Random Oracle Model., and . LATINCRYPT, volume 9230 of Lecture Notes in Computer Science, page 21-39. Springer, (2015)Private-Key Hidden Vector Encryption with Key Confidentiality., , and . CANS, volume 5888 of Lecture Notes in Computer Science, page 259-277. Springer, (2009)Predicate Encryption with Partial Public Keys., , and . CANS, volume 6467 of Lecture Notes in Computer Science, page 298-313. Springer, (2010)Controlled Homomorphic Encryption: Definition and Construction., , , and . Financial Cryptography Workshops, volume 10323 of Lecture Notes in Computer Science, page 107-129. Springer, (2017)