From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Proof with Dishonest Keys., , и . POST, том 7215 из Lecture Notes in Computer Science, стр. 149-168. Springer, (2012)Consent-driven data use in crowdsensing platforms: When data reuse meets privacy-preservation., , , и . PerCom, стр. 1-10. IEEE, (2021)Symbolic Models for Isolated Execution Environments., , и . EuroS&P, стр. 530-545. IEEE, (2017)Trustworthy Distributed Computations on Personal Data Using Trusted Execution Environments., , , и . TrustCom/BigDataSE, стр. 381-388. IEEE, (2019)Oracle Simulation: A Technique for Protocol Composition with Long Term Shared Secrets., , и . ACM Conference on Computer and Communications Security, стр. 1427-1444. ACM, (2020)Foundations of Hardware-Based Attested Computation and Application to SGX., , , и . EuroS&P, стр. 245-260. IEEE, (2016)Tractable Inference Systems: An Extension with a Deducibility Predicate., , и . CADE, том 7898 из Lecture Notes in Computer Science, стр. 91-108. Springer, (2013)Consent-driven Data Reuse in Multi-tasking Crowdsensing Systems: A Privacy-by-Design Solution., , , и . Pervasive Mob. Comput., (2022)A Manifest-Based Framework for Organizing the Management of Personal Data at the Edge of the Network., , , и . ISD, ISEN Yncréa Méditerranée / Association for Information Systems, (2019)Analysis of Key Wrapping APIs: Generic Policies, Computational Security., и . CSF, стр. 281-295. IEEE Computer Society, (2016)