Author of the publication

Augmented Oblivious Polynomial Evaluation Protocol and Its Applications.

, and . ESORICS, volume 3679 of Lecture Notes in Computer Science, page 222-230. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Temporal Evolutions and Stationary Waves for perturbed KdV equation with Nonlocal Term., and . Int. J. Bifurc. Chaos, 12 (11): 2393-2407 (2002)Secure Person-To-Person Communications Based on Biometrics Signals., , and . SEC, volume 181 of IFIP, page 205-222. Springer, (2005)Augmented Oblivious Polynomial Evaluation Protocol and Its Applications., and . ESORICS, volume 3679 of Lecture Notes in Computer Science, page 222-230. Springer, (2005)Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme., , and . ACISP, volume 4586 of Lecture Notes in Computer Science, page 171-183. Springer, (2007)An Efficient PIR Construction Using Trusted Hardware., , , and . ISC, volume 5222 of Lecture Notes in Computer Science, page 64-79. Springer, (2008)Speech enhancement based on a novel weighting spectral distortion measure., , , and . APSIPA, page 1-4. IEEE, (2014)Blocking Foxy Phishing Emails with Historical Information., , , and . ICC, page 1-5. IEEE, (2010)Turing assessor: a new tool for cyber security quantification., , and . WCNC, page 629-633. IEEE, (2006)An invertible watermarking scheme for authentication of Electronic Clinical Brain Atlas., and . ICASSP (3), page 533-536. IEEE, (2003)An improved personal CA for personal area networks., and . GLOBECOM, page 1486-1490. IEEE, (2003)