Search for persons
X
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
3
PSI-Stats: Private Set Intersection Protocols Supporting Se..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
4
LEAP: Leakage-Abuse Attack on Efficiently Deployable, Effic..:
, In:
?
Transactions on Large-Scale Data- and Knowledge-Centered Systems XLIII; Lecture Notes in Computer Science ,
5
Role-Based Access Classification: Evaluating the Performanc..:
, In:
?
Computer Security – ESORICS 2020; Lecture Notes in Computer Science ,
7
Pine: Enabling Privacy-Preserving Deep Packet Inspection on..:
, In:
?
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ,
9
PrivDPI : Privacy-Preserving Encrypted Traffic Inspectio..:
, In:
?
Database Systems for Advanced Applications; Lecture Notes in Computer Science ,
11
Privacy as a Service: Publishing Data and Models:
, In:
?
Information Security and Cryptology; Lecture Notes in Computer Science ,
12