From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Private Evaluation of Decision Trees using Sublinear Cost., , и . Proc. Priv. Enhancing Technol., 2019 (1): 266-286 (2019)Secure Computation of the kth-Ranked Element in a Star Network., , , , и . Financial Cryptography, том 12059 из Lecture Notes in Computer Science, стр. 386-403. Springer, (2020)Correcting Finite Sampling Issues in Entropy l-diversity., , и . PSD, том 9867 из Lecture Notes in Computer Science, стр. 135-146. Springer, (2016)Secure Computation of the kth-Ranked Element in a Star Network., , , , и . CoRR, (2019)A Practical Attestation Protocol for Autonomous Embedded Systems., , и . EuroS&P, стр. 263-278. IEEE, (2019)Electro-optical Surveillance in Maritime Environments., , , и . Future Security, том 318 из Communications in Computer and Information Science, стр. 334-336. Springer, (2012)Digital Watermarking., и . Handbook of Financial Cryptography and Security, Chapman and Hall/CRC, (2010)Strong PUFs: Models, Constructions, and Security Proofs., , и . Towards Hardware-Intrinsic Security, Springer, (2010)Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments, , , и . CoRR, (2005)Scalable Attestation Resilient to Physical Attacks for Embedded Devices in Mesh Networks., , , и . CoRR, (2017)