Los Angeles, CA, United States of America

Rohit Nema


Average Co-Inventor Count = 3.0

ph-index = 1

Forward Citations = 1(Granted Patents)


Company Filing History:


Years Active: 2025

Loading Chart...
1 patent (USPTO):

Title: Rohit Nema: Innovator in Secure List Merging Technology

Introduction

Rohit Nema is a notable inventor based in Los Angeles, California. He has made significant contributions to the field of computer science, particularly in the area of secure data processing. His innovative approach to merging lists has garnered attention in the tech community.

Latest Patents

Rohit Nema holds a patent for an "Apparatus and method for secure merging of lists using only local computations at each of two machines and communications solely between the two machines." This patent describes a system where non-transitory computer-readable storage mediums contain instructions executed by processors. These instructions convert a first list at a first server into an encrypted, permuted list with dummy data elements. A second list at a second server undergoes a similar transformation. The elements from both lists are then combined into a merged, sorted list of secret sharings, utilizing only local computations and communications between the two servers.

Career Highlights

Rohit Nema is currently employed at Stealth Software Technologies, Inc. His work focuses on developing secure computing solutions that enhance data privacy and integrity. His innovative contributions have positioned him as a key player in the field of secure data processing.

Collaborations

Rohit collaborates with talented individuals such as Brett Hemenway Falk and Rafail Ostrovsky. Their combined expertise fosters an environment of innovation and creativity, driving advancements in secure computing technologies.

Conclusion

Rohit Nema's work in secure list merging technology exemplifies the importance of innovation in the field of computer science. His contributions not only enhance data security but also pave the way for future advancements in secure computing.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…