Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Vickrey Auctions without Threshold Trust., , and . IACR Cryptology ePrint Archive, (2001)Secure Vickrey Auctions without Threshold Trust., , and . Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, page 87-101. Springer, (2002)Defeating the Downgrade Attack on Identity Privacy in 5G., , , and . SSR, volume 11322 of Lecture Notes in Computer Science, page 95-119. Springer, (2018)Privacy preserving 2-party queries on bipartite graphs with private set intersection., , and . SAC, page 1867-1870. ACM, (2019)Privacy-Protecting Algorithms for Digraph Shortest Path Queries., , and . Int. J. Embed. Real Time Commun. Syst., 10 (3): 86-100 (2019)Efficient Voting with No Selling of Votes., and . Theor. Comput. Sci., 226 (1-2): 105-116 (1999)The Undecidability of Form Equivalence for Context-Free and E0L Forms.. Theor. Comput. Sci., (1984)Privacy-Enhanced AKMA for Multi-Access Edge Computing Mobility., , , and . Comput., 12 (1): 2 (January 2023)Two Schemes of Privacy-Preserving Trust Evaluation., , , and . Future Gener. Comput. Syst., (2016)Hiding Regular Languages.. Grammars and Automata for String Processing, volume 9 of Topics in Computer Mathematics, page 305-316. Taylor and Francis, (2003)