Author of the publication

Fast Privacy-Preserving Text Classification Based on Secure Multiparty Computation.

, , , , and . IEEE Trans. Inf. Forensics Secur., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks., , , , , , and . Computer Communications, 34 (3): 485-493 (2011)Crowdsourced integrity verification of election results - An experience from Brazilian elections., , and . Annales des Télécommunications, 71 (7-8): 287-297 (2016)A framework for searching encrypted databases., and . J. Internet Services and Applications, 9 (1): 1:1-1:18 (2018)Providing privacy on the tuple space model., , , and . J. Internet Services and Applications, 8 (1): 19:1-19:16 (2017)Fast Point Multiplication Algorithms for Binary Elliptic Curves with and without Precomputation., , , and . Selected Areas in Cryptography, volume 8781 of Lecture Notes in Computer Science, page 324-344. Springer, (2014)The Simplest Multi-key Linearly Homomorphic Signature Scheme., and . LATINCRYPT, volume 11774 of Lecture Notes in Computer Science, page 280-300. Springer, (2019)Faster Unbalanced Private Set Intersection., and . Financial Cryptography, volume 10957 of Lecture Notes in Computer Science, page 203-221. Springer, (2018)Efficient Software Implementation of Laddering Algorithms Over Binary Elliptic Curves., , and . SPACE, volume 10662 of Lecture Notes in Computer Science, page 74-92. Springer, (2017)Software Implementation of Binary Elliptic Curves: Impact of the Carry-Less Multiplier on Scalar Multiplication., , , , , and . CHES, volume 6917 of Lecture Notes in Computer Science, page 108-123. Springer, (2011)TinyTate: Computing the Tate Pairing in Resource-Constrained Sensor Nodes., , , , , and . NCA, page 318-323. IEEE Computer Society, (2007)