Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal time-space trade-offs for non-comparison-based sorting., and . SODA, page 9-18. ACM/SIAM, (2002)Optimal Time-Space Trade-Offs for Sorting., and . FOCS, page 264-268. IEEE Computer Society, (1998)A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation., , , , , and . Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, page 142-147. Springer, (2006)On Ajtai's Lower Bound Technique for R-way Branching Programs and the Hamming Distance Problem.. Chicago J. Theor. Comput. Sci., (2005)Multiparty Computation Goes Live., , , , , , , , , and 2 other author(s). IACR Cryptology ePrint Archive, (2008)Secure Multiparty Computation Goes Live., , , , , , , , , and 2 other author(s). Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, page 325-343. Springer, (2009)I/O-Space Trade-Offs., and . SWAT, volume 1851 of Lecture Notes in Computer Science, page 448-461. Springer, (2000)A Sense of Security in Pervasive Computing - Is the Light on When the Refrigerator Door Is Closed?, and . Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, page 383-388. Springer, (2007)The All-or-Nothing Anti-Theft Policy - Theft Protection for Pervasive Computing., and . AINA Workshops (1), page 626-631. IEEE Computer Society, (2007)Location privacy via actively secure private proximity testing., , and . PerCom Workshops, page 381-386. IEEE Computer Society, (2012)