From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Generic Construction of Publicly Verifiable Predicate Encryption., , , , , , , и . AsiaCCS, стр. 889-894. ACM, (2016)PyHENet: A Generic Framework for Privacy-Preserving DL Inference Based on Fully Homomorphic Encryption., , , , , , , и . ICDIS, стр. 127-133. IEEE, (2022)EHSBoost: Enhancing ensembles for imbalanced data-sets by evolutionary hybrid-sampling., , , , , , и . SPAC, стр. 118-123. IEEE, (2017)White-box traceable dynamic attribute based encryption., , , , и . SPAC, стр. 526-530. IEEE, (2017)Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator., , , , , и . ICICS, том 8958 из Lecture Notes in Computer Science, стр. 274-289. Springer, (2014)Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage., , , , , и . ACISP (2), том 9723 из Lecture Notes in Computer Science, стр. 153-169. Springer, (2016)Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation and Untraceability., , , и . Security and Management, стр. 307-313. CSREA Press, (2009)Attribute-based queries over outsourced encrypted database., , , и . SPAC, стр. 164-168. IEEE, (2017)Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud Integration., , , , и . ISPEC, том 10701 из Lecture Notes in Computer Science, стр. 525-538. Springer, (2017)Breaking the traditional: a survey of algorithmic mechanism design applied to economic and complex environments., , , , , , и . Neural Comput. Appl., 35 (22): 16193-16222 (августа 2023)