Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approximating the Minimal Sensor Selection for Supervisory Control., , and . Discret. Event Dyn. Syst., 16 (1): 143-170 (2006)Practical implementations of program obfuscators for point functions., , , , , and . HPCS, page 460-467. IEEE, (2016)An FPGA co-processor implementation of Homomorphic Encryption., , , and . HPEC, page 1-6. IEEE, (2014)Designing an FPGA-Accelerated Homomorphic Encryption Co-Processor., , and . IEEE Trans. Emerg. Top. Comput., 5 (2): 193-206 (2017)Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme., , , , and . IEEE Trans. Emerg. Top. Comput., 9 (2): 941-956 (2021)Securing Classifiers Against Both White-Box and Black-Box Attacks using Encrypted-Input Obfuscation., , , , , and . CCSW, page 167. ACM, (2020)Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme., , , , and . IACR Cryptology ePrint Archive, (2018)Securely Sharing Encrypted Medical Information., , , and . CHASE, page 330-331. IEEE Computer Society, (2016)A Survey of Security Concepts for Common Operating Environments., , , and . ISORC Workshops, page 244-253. IEEE Computer Society, (2011)Clause-iteration with MapReduce to scalably query datagraphs in the SHARD graph-store., and . DICT@HPDC, page 35-44. ACM, (2011)