From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

CASH: A Cost Asymmetric Secure Hash Algorithm for Optimal Password Protection., и . CoRR, (2015)A derivation system and compositional logic for security protocols., , , и . J. Comput. Secur., 13 (3): 423-482 (2005)Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords., , , и . NDSS, The Internet Society, (2015)Accountability in cyber-physical systems., , , и . SOSCYPS@CPSWeek, стр. 1-3. IEEE Computer Society, (2016)A Logic of Programs with Interface-Confined Code., , , и . CSF, стр. 512-525. IEEE Computer Society, (2015)The Johnson-Lindenstrauss Transform Itself Preserves Differential Privacy., , , и . FOCS, стр. 410-419. IEEE Computer Society, (2012)Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size., , , и . IEEE Symposium on Security and Privacy, стр. 365-379. IEEE Computer Society, (2010)SoK: Differential Privacy as a Causal Property., , и . SP, стр. 354-371. IEEE, (2020)Influence-Directed Explanations for Deep Convolutional Networks., , , , и . ITC, стр. 1-8. IEEE, (2018)Consistent Counterfactuals for Deep Models., , , и . CoRR, (2021)