From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Leakage Cell Probe Model: Lower Bounds for Key-Equality Mitigation in Encrypted Multi-Maps., , и . IACR Cryptology ePrint Archive, (2019)Information security for sensors by overwhelming random sequences and permutations., , , , и . Ad Hoc Networks, (2014)Untraceable Tags Based on Mild Assumptions., , и . DPM/SETOP, том 5939 из Lecture Notes in Computer Science, стр. 178-192. Springer, (2009)Stability and Metastability of the Logit Dynamics of Strategic Games.. FUN, том 7288 из Lecture Notes in Computer Science, стр. 2. Springer, (2012)A Distributed Implementation of the Certified Information Access Service., , , , и . ESORICS, том 5283 из Lecture Notes in Computer Science, стр. 396-410. Springer, (2008)Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing., , , и . ACM Conference on Computer and Communications Security, стр. 79-93. ACM, (2019)Secure Selections on Encrypted Multi-writer Streams., , и . ACM Trans. Priv. Secur., 25 (1): 7:1-7:33 (2022)Minimal Path Length of Trees with Known Fringe., , и . Theor. Comput. Sci., 143 (1): 175-188 (1995)A lightweight privacy preserving SMS-based recommendation system for mobile users., , , , , и . Knowl. Inf. Syst., 40 (1): 49-77 (2014)Reversibility and Mixing Time for Logit Dynamics with Concurrent Updates, , , , и . CoRR, (2012)