From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Data-oblivious graph algorithms for secure computation and outsourcing., , и . AsiaCCS, стр. 207-218. ACM, (2013)Secure Fingerprint Alignment and Matching Protocols., , , и . CoRR, (2017)Secure Computation on Floating Point Numbers., , , и . IACR Cryptology ePrint Archive, (2012)Secure Outsourced Computation of Iris Matching., и . IACR Cryptology ePrint Archive, (2011)Secure outsourced computation of iris matching., и . Journal of Computer Security, 20 (2-3): 259-305 (2012)Global Attack and Remedy on IC-Specific Logic Encryption., , , , и . HOST, стр. 145-148. IEEE, (2022)Secure Computation of Hidden Markov Models., и . SECRYPT, стр. 242-253. SciTePress, (2013)Deep Encoder-Decoder Neural Networks for Retinal Blood Vessels Dense Prediction., , , , и . Int. J. Comput. Intell. Syst., 14 (1): 1078-1086 (2021)Computing the Optimal Longest Queue Length in Torus Networks., , и . TPNC, том 13082 из Lecture Notes in Computer Science, стр. 3-14. Springer, (2021)Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model., , и . Int. J. Inf. Sec., 16 (6): 577-601 (2017)