Author of the publication

Secure parallel computation on national scale volumes of data.

, , , and . USENIX Security Symposium, page 2487-2504. USENIX Association, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Investigating the feasibility of LEAP+ in ZigBee specification., , , , and . IRI, page 406-412. IEEE Computer Society, (2014)Addressing Extreme Market Responses Using Secure Aggregation., , and . ICAIF, page 192-198. ACM, (2022)Secure Computation with Differentially Private Access Patterns., and . ACM Conference on Computer and Communications Security, page 490-507. ACM, (2018)An Efficient Data-Independent Priority Queue and its Application to Dark Pools., , , and . IACR Cryptol. ePrint Arch., (2023)A Security Analysis of an In-Vehicle Infotainment and App Platform., , , and . WOOT, USENIX Association, (2016)Differentially Private Access Patterns in Secure Computation., and . IACR Cryptology ePrint Archive, (2017)Color image cryptosystem using chaotic maps., and . CIMSIVP, page 142-147. IEEE, (2011)A cluster-based key management framework for resource constraint networks., , , , and . IRI, page 413-419. IEEE Computer Society, (2014)Secure parallel computation on national scale volumes of data., , , and . USENIX Security Symposium, page 2487-2504. USENIX Association, (2020)A novel clustering paradigm for key pre-distribution: Toward a better security in homogenous WSNs., , , , and . CCNC, page 308-316. IEEE, (2013)