From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage., , , , и . ACM Trans. Priv. Secur., 24 (3): 18:1-18:35 (2021)What You See is Not What You Get: The Role of Email Presentation in Phishing Susceptibility., , , , , , и . CoRR, (2023)GTree: GPU-Friendly Privacy-preserving Decision Tree Training and Inference., , , , , , и . CoRR, (2023)Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database., , , и . WISTP, том 10741 из Lecture Notes in Computer Science, стр. 41-55. Springer, (2017)Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication., , , , , , и . ACSAC, стр. 799-813. ACM, (2023)e-PRNU: Encrypted Domain PRNU-Based Camera Attribution for Preserving Privacy., , , и . IEEE Trans. Dependable Secur. Comput., 18 (1): 426-437 (2021)PIDGIN: privacy-preserving interest and content sharing in opportunistic networks., , , и . AsiaCCS, стр. 135-146. ACM, (2014)Using Aspect-GAMMA in the design of embedded systems., , , , , , , , и . HLDVT, стр. 69-74. IEEE Computer Society, (2002)An Architectural Approach for Self-Managing Security Services., и . AINA Workshops, стр. 153-158. IEEE Computer Society, (2009)Privacy-Preserving Content Delivery Networks., , и . LCN, стр. 607-610. IEEE Computer Society, (2017)