Author of the publication

Maliciously Secure Multi-Client ORAM.

, , , and . ACNS, volume 10355 of Lecture Notes in Computer Science, page 645-664. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptographic techniques for privacy and access control in cloud-based applications.. Saarland University, Saarbrücken, Germany, (2018)Group ORAM for privacy and access control in outsourced personal records., , , and . Journal of Computer Security, 27 (1): 1-47 (2019)Simple Password-Hardened Encryption Services., , , , , and . USENIX Security Symposium, page 1405-1421. USENIX Association, (2018)Privacy and Access Control for Outsourced Personal Records., , , and . IEEE Symposium on Security and Privacy, page 341-358. IEEE Computer Society, (2015)Brief announcement: towards security and privacy for outsourced data in the multi-party setting., , , and . PODC, page 144-146. ACM, (2014)On the Security of Frequency-Hiding Order-Preserving Encryption., , and . CANS, volume 11261 of Lecture Notes in Computer Science, page 51-70. Springer, (2017)Maliciously Secure Multi-Client ORAM., , , and . ACNS, volume 10355 of Lecture Notes in Computer Science, page 645-664. Springer, (2017)Security and Privacy by Declarative Design., , and . CSF, page 81-96. IEEE Computer Society, (2013)