Author of the publication

PrivApprox: Privacy-Preserving Stream Analytics.

, , , , , and . USENIX Annual Technical Conference, page 659-672. USENIX Association, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Statistical Queries over Distributed Private User Data., , , and . NSDI, page 169-182. USENIX Association, (2012)Green: Towards a Pollution-Free Peer-to-Peer Content Sharing Service, , , , and . CoRR, (2011)Privacy Preserving Stream Analytics: The Marriage of Randomized Response and Approximate Computing., , , , , and . CoRR, (2017)Securing key issuing in peer-to-peer networks., , , , , , and . SAC, page 84-85. ACM, (2009)PrivApprox: Privacy-Preserving Stream Analytics., , , , , and . USENIX Annual Technical Conference, page 659-672. USENIX Association, (2017)An untold story of redundant clouds: making your service deployment truly reliable., , , and . HotDep, page 3:1-3:6. ACM, (2013)Phagocytes: A Holistic Defense and Protection Against Active P2P Worms, , , , and . CoRR, (2011)Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks., , , , , and . Peer-to-Peer Computing, page 22-29. IEEE Computer Society, (2008)WebIBC: Identity Based Cryptography for Client Side Security in Web Applications., , , , , and . ICDCS, page 689-696. IEEE Computer Society, (2008)Privacy-Preserving Data Analytics., , , , , and . Encyclopedia of Big Data Technologies, Springer, (2019)