Author of the publication

Privacy-Preserving Matching Protocols for Attributes and Strings.

, , , , and . IACR Cryptology ePrint Archive, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fastplay-A Parallelization Model and Implementation of SMC on CUDA based GPU Cluster Architecture., , and . IACR Cryptology ePrint Archive, (2011)Secure Privacy-Preserving Association Rule Mining With Single Cloud Server., , , , , , and . IEEE Access, (2021)A Method for Building More Non-supersingular Elliptic Curves Suitable for Pairing-based Cryptosystems., , and . IEICE Transactions, 88-A (9): 2468-2470 (2005)PEPFL: A Framework for a Practical and Efficient Privacy-Preserving Federated Learning., , , , , , , and . IACR Cryptol. ePrint Arch., (2021)An Efficient Identity-based Signature Scheme and Its Applications., , , and . I. J. Network Security, 5 (1): 89-98 (2007)A New Method of Building More Non-supersingular Elliptic Curves., , and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 657-664. Springer, (2005)Privacy-Preserving Matching Protocols for Attributes and Strings., , , , and . IACR Cryptology ePrint Archive, (2010)Special Polynomial Families for Generating More Suitable Elliptic Curves for Pairing-Based Cryptosystems., , and . IACR Cryptology ePrint Archive, (2005)Effective Polynomial Families for Generating More Pairing-Friendly Elliptic Curves., , and . IACR Cryptology ePrint Archive, (2005)Shadow attacks: automatically evading system-call-behavior based malware detection., , , , and . Journal in Computer Virology, 8 (1-2): 1-13 (2012)