Jack P. K. Ma

Orcid: 0009-0007-0660-5384

According to our database1, Jack P. K. Ma authored at least 9 papers between 2017 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
How (Not) to Build Threshold EdDSA.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Real Threshold ECDSA.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

SMART Credentials in the Multi-queue of Slackness (or Secure Management of Anonymous Reputation Traits without Global Halting).
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

Scored Anonymous Credentials.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
Secure-Computation-Friendly Private Set Intersection from Oblivious Compact Graph Evaluation.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Let's Stride Blindfolded in a Forest: Sublinear Multi-Client Decision Trees Evaluation.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

On Multi-Channel Huffman Codes for Asymmetric-Alphabet Channels.
Proceedings of the IEEE International Symposium on Information Theory, 2021

2020
Learning Model with Error - Exposing the Hidden Model of BAYHENN.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

2017
Privacy-Preserving Decision Trees Evaluation via Linear Functions.
Proceedings of the Computer Security - ESORICS 2017, 2017


  Loading...