Search for persons
X
?
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security ,
1
Nomadic: Normalising Maliciously-Secure Distance with Cosin..:
, In:
?
Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2024 ,
2
Threshold Structure-Preserving Signatures: Strong and Adapt..:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
3
Decentralized Private Stream Aggregation from Lattices:
, In:
?
2023 20th Annual International Conference on Privacy, Security and Trust (PST) ,
4
Efficient Three-party Boolean-to-Arithmetic Share Conversio:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
6
A Framework for UC Secure Privacy Preserving Biometric Auth..:
, In:
?
Lecture Notes in Computer Science; Information Security ,
7
$$\textsf {DEVA}$$: Decentralized, Verifiable Secure Aggreg..:
, In:
?
Information Security and Privacy; Lecture Notes in Computer Science ,
8
Non-interactive, Secure Verifiable Aggregation for Decentra..:
, In:
?
Provable and Practical Security; Lecture Notes in Computer Science ,
9
Turn-Based Communication Channels:
, In:
?
Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2019 ,
11
Sum It Up: Verifiable Additive Homomorphic Secret Sharing:
, In:
?
IECON 2020 The 46th Annual Conference of the IEEE Industrial Electronics Society ,
13