Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ProSecCo: Progressive Sequence Mining with Convergence Guarantees., , and . ICDM, page 417-426. IEEE Computer Society, (2018)ProSecCo: progressive sequence mining with convergence guarantees., , and . Knowl. Inf. Syst., 62 (4): 1313-1340 (2020)Designing Hardware for Cryptography and Cryptography for Hardware., , , , and . CCS, page 1-4. ACM, (2022)Spectrum: High-bandwidth Anonymous Broadcast., , and . NSDI, page 229-248. USENIX Association, (2022)Private Approximate Nearest Neighbor Search with Sublinear Communication., , and . SP, page 911-929. IEEE, (2022)AdVeil: A Private Targeted-Advertising Ecosystem., , and . IACR Cryptol. ePrint Arch., (2021)ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing., , , , , and . SP, page 1933-1952. IEEE, (2022)SchengenDB: A Data Protection Database Proposal., , , , and . Poly/DMAH@VLDB, volume 11721 of Lecture Notes in Computer Science, page 24-38. Springer, (2019)Private Access Control for Function Secret Sharing., , , and . IACR Cryptol. ePrint Arch., (2022)Constrained Pseudorandom Functions for Inner-Product Predicates from Weaker Assumptions.. IACR Cryptol. ePrint Arch., (2024)