Author of the publication

Design and implementation of privacy-preserving reconciliation protocols.

, , , and . EDBT/ICDT Workshops, page 121-130. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model., , , and . DPM/SETOP, volume 8247 of Lecture Notes in Computer Science, page 178-193. Springer, (2013)SMC-MuSe: A Framework for Secure Multi-Party Computation on MultiSets., , and . GI-Jahrestagung, volume P-220 of LNI, page 131-133. GI, (2013)Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model (Extended version)., , , and . IACR Cryptology ePrint Archive, (2013)Fair and Privacy-Preserving Multi-party Protocols for Reconciling Ordered Input Sets., , and . ISC, volume 6531 of Lecture Notes in Computer Science, page 136-151. Springer, (2010)Privacy-Preserving Multi-party Reconciliation Using Fully Homomorphic Encryption., , , and . NSS, volume 7873 of Lecture Notes in Computer Science, page 493-506. Springer, (2013)Fair and Privacy-Preserving Multi-Party Protocols for Reconciling Ordered Input Sets (Extended version)., , and . IACR Cryptology ePrint Archive, (2011)Design and implementation of privacy-preserving reconciliation protocols., , , and . EDBT/ICDT Workshops, page 121-130. ACM, (2013)To model or not to model: Controlling Pac-Man ghosts without incorporating global knowledge., , , , , , , and . IEEE Congress on Evolutionary Computation, page 3464-3471. IEEE, (2008)Improving the ecological footprint of nuclear energy: a risk-based lifecycle assessment approach for critical infrastructure systems., , and . IJCIS, 1 (4): 394-403 (2005)