| Publication | Date of Publication | Type |
|---|
| Distributed protocols for oblivious transfer and polynomial evaluation | 2024-10-23 | Paper |
Privacy preserving solution of DCOPs by mediation Artificial Intelligence | 2023-06-27 | Paper |
PC-SyncBB: a privacy preserving collusion secure DCOP algorithm Artificial Intelligence | 2021-11-02 | Paper |
Privacy preserving region optimal algorithms for symmetric and asymmetric DCOPs Artificial Intelligence | 2019-08-28 | Paper |
Privacy preserving implementation of the \textsc{Max-Sum} algorithm and its variants Journal of Artificial Intelligence Research | 2017-10-24 | Paper |
Privacy by diversity in sequential releases of databases Information Sciences | 2017-05-16 | Paper |
Constrained obfuscation of relational databases Information Sciences | 2017-02-07 | Paper |
P-syncBB: A privacy preserving branch and bound DCOP algorithm Journal of Artificial Intelligence Research | 2017-01-11 | Paper |
Addendum to ``Finding all maximally-matchable edges in a bipartite graph Theoretical Computer Science | 2013-12-17 | Paper |
Oblivious evaluation of multivariate polynomials Journal of Mathematical Cryptology | 2013-09-04 | Paper |
A practical approximation algorithm for optimal \(k\)-anonymity Data Mining and Knowledge Discovery | 2013-03-28 | Paper |
Limiting disclosure of sensitive data in sequential releases of databases Information Sciences | 2012-10-17 | Paper |
Finding all maximally-matchable edges in a bipartite graph Theoretical Computer Science | 2012-05-14 | Paper |
| Improved bounds on Bell numbers and on moments of sums of random variables | 2011-05-30 | Paper |
Generalized oblivious transfer by secret sharing Designs, Codes and Cryptography | 2011-03-10 | Paper |
On proper secrets, \((t,k)\)-bases and linear codes Designs, Codes and Cryptography | 2009-10-14 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2009-05-14 | Paper |
Multipartite secret sharing by bivariate interpolation Journal of Cryptology | 2009-05-08 | Paper |
Improved versions of Tardos' fingerprinting scheme Designs, Codes and Cryptography | 2009-03-31 | Paper |
Characterizing Ideal Weighted Threshold Secret Sharing SIAM Journal on Discrete Mathematics | 2009-03-16 | Paper |
k-Anonymization with Minimal Loss of Information Algorithms – ESA 2007 | 2008-09-25 | Paper |
Mathematical Foundations of Computer Science 2003 Lecture Notes in Computer Science | 2007-12-07 | Paper |
Multipartite Secret Sharing by Bivariate Interpolation Automata, Languages and Programming | 2007-09-11 | Paper |
Hierarchical threshold secret sharing Journal of Cryptology | 2007-05-03 | Paper |
Vector assignment schemes for asymmetric settings Acta Informatica | 2006-05-26 | Paper |
Low bandwidth dynamic traitor tracing schemes Journal of Cryptology | 2006-02-08 | Paper |
Optimal preemptive scheduling for general target functions Journal of Computer and System Sciences | 2006-01-10 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2005-12-07 | Paper |
Mathematical Foundations of Computer Science 2004 Lecture Notes in Computer Science | 2005-08-22 | Paper |
Approximation schemes for the min-max starting time problem Acta Informatica | 2005-02-11 | Paper |
| scientific article; zbMATH DE number 2066065 (Why is no real title available?) | 2004-05-18 | Paper |
Vector assignment problems: a general framework Journal of Algorithms | 2004-03-14 | Paper |
| scientific article; zbMATH DE number 1947414 (Why is no real title available?) | 2003-07-08 | Paper |
Dynamic traitor tracing Journal of Cryptology | 2001-09-27 | Paper |
| scientific article; zbMATH DE number 1418305 (Why is no real title available?) | 2000-08-27 | Paper |
| scientific article; zbMATH DE number 1375124 (Why is no real title available?) | 2000-01-04 | Paper |
Homogenization of Two-Dimensional Linear Flows with Integral Invariance SIAM Journal on Applied Mathematics | 1998-02-09 | Paper |
| scientific article; zbMATH DE number 1104232 (Why is no real title available?) | 1998-01-14 | Paper |
| scientific article; zbMATH DE number 1033957 (Why is no real title available?) | 1997-11-25 | Paper |
Uniqueness of piecewise smooth weak solutions of multidimensional degenerate parabolic equations Journal of Mathematical Analysis and Applications | 1997-10-22 | Paper |
Regularity of weak solutions of the nonlinear Fokker-Planck equation Mathematical Research Letters | 1997-04-29 | Paper |
Convergence Rate of Approximate Solutions to Conservation Laws with Initial Rarefactions SIAM Journal on Numerical Analysis | 1995-05-29 | Paper |
On the piecewise smoothness of entropy solutions to scalar conservation laws Communications in Partial Differential Equations | 1995-03-01 | Paper |
The Convergence Rate of Godunov Type Schemes SIAM Journal on Numerical Analysis | 1994-11-17 | Paper |