Search for persons
X
?
Proceedings of the 18th International Conference on Availability, Reliability and Security ,
2
CACS: A Cloud Privacy-Preserving Attribute Management Syste:
, In:
?
Security and Trust Management; Lecture Notes in Computer Science ,
3
Server-Supported Decryption for Mobile Devices:
, In:
?
Computer Security. ESORICS 2022 International Workshops; Lecture Notes in Computer Science ,
4
A Comparison-Based Methodology for the Security Assurance o..:
, In:
?
Lecture Notes in Computer Science; Data Privacy Management, Cryptocurrencies and Blockchain Technology ,
5
A Parallel Privacy-Preserving Shortest Path Protocol from a..:
, In:
?
2022 IEEE 35th Computer Security Foundations Symposium (CSF) ,
6
Interpreting Epsilon of Differential Privacy in Terms of Ad..:
, In:
?
Cryptology and Network Security; Lecture Notes in Computer Science ,
8
Linear-Time Oblivious Permutations for SPDZ:
, In:
?
Proceedings of the 8th ACM Conference on Information-Centric Networking ,
10
Attribute-based encryption for named data networking:
, In:
?
Security and Trust Management; Lecture Notes in Computer Science ,
12
Efficient Permutation Protocol for MPC in the Head:
, In:
?
Enterprise, Business-Process and Information Systems Modeling; Lecture Notes in Business Information Processing ,
14