Author of the publication

On Minimizing the Size of Encrypted Databases.

, and . DBSec, volume 8566 of Lecture Notes in Computer Science, page 364-372. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TDMA scheduling and channel assignment for cognitive tactical networks., , , , , and . MILCOM, page 1-6. IEEE, (2012)Enhancements to traffic engineering for multi protocol label switching, , and . Teletraffic Engineering in the Internet EraProceedings of the International Teletraffic Congress - ITC-I7, volume 4 of Teletraffic Science and Engineering, Elsevier, (2001)On Minimizing the Size of Encrypted Databases., and . DBSec, volume 8566 of Lecture Notes in Computer Science, page 364-372. Springer, (2014)The Topological Structure of Maximal Lattice Free Convex Bodies: The General Case., , and . IPCO, volume 920 of Lecture Notes in Computer Science, page 244-251. Springer, (1995)Simulating and implementing geospatially-based binding mechanisms for mobile peering., and . AMBI-SYS, page 23. ICST, (2008)Network restoration under dual failures using path-protecting preconfigured cycles., , and . Telecommun. Syst., 49 (3): 271-286 (2012)Can Large Language Models Detect Misinformation in Scientific News Reporting?, , , , , , , and . CoRR, (2024)Centralized multi-scale singular value decomposition for feature construction in LIDAR image classification problems., , , , and . AIPR, page 1-6. IEEE Computer Society, (2012)Discovering Functional Communities in Social Media., , , and . ICDM Workshops, page 917-924. IEEE Computer Society, (2015)Spectrum allocation in C-NEDAT: A tool to automate MANET design and opportunistically adapt network spectrum use., , , , and . MILCOM, page 1702-1707. IEEE, (2011)