publication venue for After you, please: browser extensions order attacks and countermeasures. 19:623-638. 2020 Supervised machine learning using encrypted training data. 365-377. 2018 A pairing-based cryptographic approach for data security in the Cloud. 17:441-461. 2017 Bayesian Rational Exchange. 7:85-100. 2008