Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Co-creating Security-and-Privacy-by-Design Systems., , , , , and . ARES, page 768-775. IEEE Computer Society, (2016)CryptoDSPs for Cloud Privacy., and . WISE Workshops, volume 6724 of Lecture Notes in Computer Science, page 428-439. Springer, (2010)Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation., , and . IACR Cryptol. ePrint Arch., (2022)Efficient protocols for secure adaptive filtering., and . ICASSP, page 5860-5863. IEEE, (2011)Multivariate lattices for encrypted image processing., , and . ICASSP, page 1707-1711. IEEE, (2015)Secure Adaptive Filtering., and . IEEE Trans. Information Forensics and Security, 6 (2): 469-485 (2011)Efficient Zero-Knowledge Watermark Detection with Improved Robustness to Sensitivity Attacks., and . EURASIP J. Information Security, (2007)Number Theoretic Transforms for Secure Signal Processing., , and . CoRR, (2016)Privacy-preserving semi-parallel logistic regression training with Fully Homomorphic Encryption., , , and . IACR Cryptology ePrint Archive, (2019)Image denoising in the encrypted domain., , and . WIFS, page 1-6. IEEE, (2016)