Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning Model with Error - Exposing the Hidden Model of BAYHENN., , , , and . IJCAI, page 3529-3535. ijcai.org, (2020)Scheduled for July 2020, Yokohama, Japan, postponed due to the Corona pandemic..PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation., , , , and . ESORICS, volume 7459 of Lecture Notes in Computer Science, page 679-696. Springer, (2012)Sharding Blockchain., , , , and . iThings/GreenCom/CPSCom/SmartData, page 1665. IEEE, (2018)Can We Securely Outsource Big Data Analytics with Lightweight Cryptography?. SCC@AsiaCCS, page 1. ACM, (2019)Can You Find The One for Me?, and . WPES@CCS, page 54-65. ACM, (2018)Unconditionally Secure Access Control Encryption., and . ISIT, page 648-653. IEEE, (2023)Omnes pro uno: Practical Multi-Writer Encrypted Database., and . USENIX Security Symposium, page 2371-2388. USENIX Association, (2022)Let's Stride Blindfolded in a Forest: Sublinear Multi-Client Decision Trees Evaluation., , , and . NDSS, The Internet Society, (2021)How (Not) to Build Threshold EdDSA., , , and . RAID, page 123-134. ACM, (2023)Secure-Computation-Friendly Private Set Intersection from Oblivious Compact Graph Evaluation., and . AsiaCCS, page 1086-1097. ACM, (2022)