From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Practical Foundations of History Independence., , и . CoRR, (2015)On Watermarking Numeric Sets., , и . IWDW, том 2613 из Lecture Notes in Computer Science, стр. 130-146. Springer, (2002)Steganography.. Encyclopedia of Database Systems, Springer US, (2009)Costs and Security in Clouds., и . Secure Cloud Computing, Springer, (2014)INFUSE: Invisible plausibly-deniable file system for NAND flash., , и . Proc. Priv. Enhancing Technol., 2020 (4): 239-254 (2020)On Securing Untrusted Clouds with Cryptography., и . IEEE Data Eng. Bull., 35 (4): 9-20 (2012)Secure Data Outsourcing.. VLDB, стр. 1431-1432. ACM, (2007)Preventing history forgery with secure provenance., , и . ACM Trans. Storage, 5 (4): 12:1-12:43 (2009)Write-Once Read-Many Oblivious RAM., и . IEEE Trans. Inf. Forensics Secur., 6 (4): 1394-1403 (2011)Rights Protection for Discrete Numeric Streams., , и . IEEE Trans. Knowl. Data Eng., 18 (5): 699-714 (2006)