Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Electronic Voting Systems - From Theory to Implementation., , , , , , , , , and 4 other author(s). e-Democracy, volume 441 of Communications in Computer and Information Science, page 113-122. Springer, (2013)Efficient Modular NIZK Arguments from Shift and Product., , and . CANS, volume 8257 of Lecture Notes in Computer Science, page 92-121. Springer, (2013)A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing., , , , , and . INFOCOM, page 2130-2138. IEEE, (2014)On the Sustainability of Blockchain Funding., and . ICDM Workshops, page 89-96. IEEE, (2018)A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument., and . IACR Cryptology ePrint Archive, (2011)New Non-Interactive Zero-Knowledge Subset Sum, Decision Knapsack And Range Arguments., and . IACR Cryptology ePrint Archive, (2012)Proof-Carrying Cloud Computation: The Case of Convex Optimization., , , , and . IEEE Trans. Information Forensics and Security, 9 (11): 1790-1803 (2014)An Efficient E2E Verifiable E-voting System without Setup Assumptions., , and . IEEE Security & Privacy, 15 (3): 14-23 (2017)Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication., and . Inscrypt, volume 6151 of Lecture Notes in Computer Science, page 154-163. Springer, (2009)Indistinguishable Proofs of Work or Knowledge., , , and . ASIACRYPT (2), volume 10032 of Lecture Notes in Computer Science, page 902-933. (2016)