Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Private Set Intersection for Unequal Set Sizes with Mobile Applications., , , , and . Proc. Priv. Enhancing Technol., 2017 (4): 177-197 (2017)Trustworthy AI Inference Systems: An Industry Research View., , , , , , , , , and 18 other author(s). CoRR, (2020)Valiant's Universal Circuit is Practical., and . EUROCRYPT (1), volume 9665 of Lecture Notes in Computer Science, page 699-728. Springer, (2016)Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages., , , and . CoRR, (2021)Faster Privacy-Preserving Location Proximity Schemes., , , , and . IACR Cryptology ePrint Archive, (2018)Efficient and Scalable Universal Circuits., , , and . J. Cryptol., 33 (3): 1216-1271 (2020)Efficient Private Function Evaluation.. Technical University of Darmstadt, Germany, (2021)Secure and Private Function Evaluation with Intel SGX., , , and . CCSW, page 165-181. ACM, (2019)Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages., , , and . USENIX Security Symposium, page 6133-6150. USENIX Association, (2023)Web Application for Privacy-preserving Scheduling using Secure Computation., , and . ICETE (2), page 456-463. SciTePress, (2019)