Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure and Privacy-Preserving Federated Learning via Co-Utility., , , and . IEEE Internet Things J., 9 (5): 3988-4000 (2022)Circuit-Free General-Purpose Multi-Party Computation via Co-Utile Unlinkable Outsourcing., and . CoRR, (2021)Circuit-Free General-Purpose Multi-Party Computation via Co-Utile Unlinkable Outsourcing., and . IEEE Trans. Dependable Secur. Comput., 20 (1): 539-550 (2023)Secure and Privacy-Preserving Federated Learning via Co-Utility., , , and . CoRR, (2021)An Incentive-Based System for Information Providers over Peer-to-Peer Mobile Ad-Hoc Networks., , , , , and . MDAI, volume 4617 of Lecture Notes in Computer Science, page 380-392. Springer, (2007)Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts., , , , , and . IEEE Trans. Computers, 65 (2): 466-479 (2016)Selected Privacy Research Topics in the ARES Project: An Overview., and . Advanced Research in Data Privacy, volume 567 of Studies in Computational Intelligence, Springer, (2015)Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm., , , , and . IEEE/ACM Trans. Netw., 21 (2): 621-633 (2013)Secure, accurate and privacy-aware fully decentralized learning via co-utility., , , and . Comput. Commun., (July 2023)User-private information retrieval based on a peer-to-peer community., , , and . Data Knowl. Eng., 68 (11): 1237-1252 (2009)