Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blindfolded Data Search via Secure Pattern Matching., and . IEEE Computer, 46 (12): 68-75 (2013)Private Projections & Variants., , , and . IACR Cryptology ePrint Archive, (2016)Private Set Projections & Variants., , , and . WPES@CCS, page 87-98. ACM, (2017)Multi-scale correlation structure of gene expression in the brain., , , , , , , , , and 1 other author(s). Neural Networks, 24 (9): 933-942 (2011)Genodroid: are privacy-preserving genomic tests ready for prime time?, , , and . WPES, page 97-108. ACM, (2012)Secure genomic testing with size- and position-hiding private substring matching., , and . WPES, page 107-118. ACM, (2013)UnLinked: Private Proximity-based Off-line OSN Interaction., , and . WPES@CCS, page 121-131. ACM, (2015)Three-Party ORAM for Secure Computation., , , and . ASIACRYPT (1), volume 9452 of Lecture Notes in Computer Science, page 360-385. Springer, (2015)Rich Queries on Encrypted Data: Beyond Exact Matches., , , , , and . ESORICS (2), volume 9327 of Lecture Notes in Computer Science, page 123-145. Springer, (2015)Bounded Size-Hiding Private Set Intersection., , and . SCN, volume 9841 of Lecture Notes in Computer Science, page 449-467. Springer, (2016)