Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation., , , , , , and . IACR Cryptology ePrint Archive, (2016)Transport mode assessment for inbound logistics: A study based on coffee industry., , , , and . SMC, page 1318-1323. IEEE, (2014)Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model., , , and . IACR Cryptology ePrint Archive, (2009)A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM., , , , and . IACR Cryptology ePrint Archive, (2017)Information-Theoretically Secure String Commitments Based on Packet Reordering Channels., , , and . IEEE Access, (2021)An information theoretical model for quantum secret sharing., , , , and . Quantum Inf. Comput., 5 (1): 69-80 (2005)Performability evaluation of transport modes for cloud-based inbound logistics: a study based on coffee industry., , , , and . Int. J. Manuf. Technol. Manag., 34 (2): 126-147 (2020)Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions., , , and . Comput. J., 58 (10): 2738-2746 (2015)Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra., , , , , and . IEEE Trans. Inf. Forensics Secur., 11 (1): 59-73 (2016)Practical, Label Private Deep Learning Training based on Secure Multiparty Computation and Differential Privacy., , , and . IACR Cryptol. ePrint Arch., (2021)