Author of the publication

Privacy-Preserving Data Exfiltration Monitoring Using Homomorphic Encryption.

. CSCloud, page 48-53. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme., , , , and . IACR Cryptology ePrint Archive, (2018)Practical implementations of program obfuscators for point functions., , , , , and . HPCS, page 460-467. IEEE, (2016)An FPGA co-processor implementation of Homomorphic Encryption., , , and . HPEC, page 1-6. IEEE, (2014)Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme., , , , and . IEEE Trans. Emerg. Top. Comput., 9 (2): 941-956 (2021)Securely Sharing Encrypted Medical Information., , , and . CHASE, page 330-331. IEEE Computer Society, (2016)Securing Classifiers Against Both White-Box and Black-Box Attacks using Encrypted-Input Obfuscation., , , , , and . CCSW, page 167. ACM, (2020)A Survey of Security Concepts for Common Operating Environments., , , and . ISORC Workshops, page 244-253. IEEE Computer Society, (2011)WAHC'18: 6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography., and . ACM Conference on Computer and Communications Security, page 2183-2184. ACM, (2018)Stochastic behavior of random constant scanning worms., and . ICCCN, page 339-344. IEEE, (2005)Homomorphic Encryption for Privacy-Preserving Genome Sequences Search., , and . SMARTCOMP, page 7-12. IEEE, (2019)