Author of the publication

A Signature Scheme with a Fuzzy Private Key.

, , , , and . ACNS, volume 9092 of Lecture Notes in Computer Science, page 105-126. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Tuning of Privacy Budgets in Input-Discriminative Local Differential Privacy., and . IEEE Internet Things J., 10 (18): 15990-16005 (September 2023)Localization Attacks Using Matrix and Tensor Factorization., and . IEEE Trans. Inf. Forensics Secur., 11 (8): 1647-1660 (2016)Toward Evaluating Re-identification Risks in the Local Privacy Model., and . CoRR, (2020)Locally Differentially Private Analysis of Graph Statistics., , and . CoRR, (2020)Restricted Local Differential Privacy for Distribution Estimation with High Data Utility., and . CoRR, (2018)Group Sparsity Tensor Factorization for Re-Identification of Open Mobility Traces., , and . IEEE Trans. Inf. Forensics Secur., 12 (3): 689-704 (2017)CARGO: Crypto-Assisted Differentially Private Triangle Counting without Trusted Servers., , , , and . CoRR, (2023)A Signature Scheme with a Fuzzy Private Key., , , , and . ACNS, volume 9092 of Lecture Notes in Computer Science, page 105-126. Springer, (2015)A Secure and Practical Signature Scheme for Blockchain Based on Biometrics., , , , , , and . ISPEC, volume 10701 of Lecture Notes in Computer Science, page 877-891. Springer, (2017)How to Handle Excessively Anonymized Datasets., , , , , , , and . J. Inf. Process., (2018)