Loading...
The system can't perform the operation now. Try again later.
Articles
Case law
Profiles
My profile
My library
Metrics
Alerts
Settings
Get journal articles
Get journal articles
Profiles
My profile
My library
Thomas Schneider
Professor of Computer Science, TU Darmstadt
Verified email at encrypto.cs.tu-darmstadt.de
Cited by 14215
Secure Computation
Multi-Party Computation
Privacy Enhancing Technologies
Cryptographic Protocols
Applied Cryptography
Rahul Tandra
LinkedIn.com
Verified email at linkedin.com
Cited by 8039
Privacy
Differential Privacy
Federated Learning
Multi Party Computation
Zekeriya Erkin
Associate Professor, Delft University of Technology
Verified email at tudelft.nl
Cited by 4191
information security and privacy
multi-party computation
homomorphic encryption
blockchain
GDPR
Matthias Fitzi
IOHK
Verified email at iohk.io
Cited by 2614
Byzantine agreement
broadcast
consensus
blockchain
multi-party computation
Daniel Demmler
Zama
Verified email at zama.ai
Cited by 2117
Security
Privacy
Applied Cryptography
Multi-Party Computation
Cryptographic Protocols
Bingsheng Zhang
Zhejiang University, IOHK
Verified email at zju.edu.cn
Cited by 1857
Data Security
Cryptography
Multi-party computation
Blockchain
Zero-knowledge proof
Yang Liu
Xidian University
Cited by 1532
Multi-Party Computation
AI Security
Hossein Yalame
Robert Bosch Gmbh
Verified email at de.bosch.com
Cited by 1289
Secure Computation
Applied Cryptography
Multi-Party Computation
Privacy-Preserving ML
Changlu Lin(林昌露)
Fujian Normal University
Verified email at fjnu.edu.cn
Cited by 1154
Secret sharing
public key cryptography
multi-party computation
provable security
could computing
Phillipp Schoppmann
Research Scientist, Google
Verified email at google.com
Cited by 1052
Privacy
Security
Cryptography
Multi-Party Computation
1 - 10
Privacy
Terms
Help
About Scholar
Search help