Author of the publication

Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information.

, , and . IACR Cryptology ePrint Archive, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Genomic Security (Lest We Forget)., , and . IEEE Secur. Priv., 15 (5): 38-46 (2017)Chains and Whips - An approach to lighweight MACs., , , , and . Krypto-Tag, Gesellschaft für Informatik e.V. / FG KRYPTO, (2018)(If) Size Matters: Size-Hiding Private Set Intersection., , and . Public Key Cryptography, volume 6571 of Lecture Notes in Computer Science, page 156-173. Springer, (2011)On the TOCTOU Problem in Remote Attestation., , , and . CoRR, (2020)In Content We Trust: Network-Layer Trust in Content-Centric Networking., , and . IEEE/ACM Trans. Netw., 27 (5): 1787-1800 (2019)Stylometric Linkability of Tweets., , , and . WPES, page 205-208. ACM, (2014)Balancing Security and Privacy in Genomic Range Queries., , and . WPES@CCS, page 106-110. ACM, (2019)A Security Architecture for Computational Grids, , , and . Proceedings of 5th ACM Conference Computer and Communications Security, page 83--92. (1998)Group Signatures Á la carte., and . SODA, page 848-849. ACM/SIAM, (1999)Covert Ephemeral Communication in Named Data Networking., , , and . CoRR, (2013)