Author of the publication

TASTY: tool for automating secure two-party computations.

, , , , and . ACM Conference on Computer and Communications Security, page 451-462. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of diverse classification approaches for land use/cover mapping in a Mediterranean region utilizing Hyperion data., , , and . Int. J. Digital Earth, 7 (3): 194-216 (2014)Conjunctive Query Inseparability of OWL 2 QL TBoxes., , , , , and . AAAI, AAAI Press, (2011)Generalized satisfiability for the description logic ALC., and . Theor. Comput. Sci., (2013)More Efficient Oblivious Transfer Extensions., , , and . J. Cryptology, 30 (3): 805-858 (2017)The Complexity of Monotone Hybrid Logics over Linear Frames and the Natural Numbers, , , , , and . CoRR, (2012)The Complexity of Generalized Satisfiability for Linear Temporal Logic, , , , and . Logical Methods in Computer Science, (2009)Visual-Inertial Teach and Repeat for Aerial Inspection., , , , and . CoRR, (2018)Privacy-Preserving ECG Classification With Branching Programs and Neural Networks., , , , and . IEEE Trans. Information Forensics and Security, 6 (2): 452-468 (2011)Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting., , , , , , and . ICL-GNSS, page 1-6. IEEE, (2018)The tractability of model checking for LTL: The good, the bad, and the ugly fragments., , , , , and . ACM Trans. Comput. Log., 12 (2): 13:1-13:28 (2011)