From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Verifiable Security of Boneh-Franklin Identity-Based Encryption., , и . ProvSec, том 6980 из Lecture Notes in Computer Science, стр. 68-83. Springer, (2011)Beyond Provable Security Verifiable IND-CCA Security of OAEP., , , и . CT-RSA, том 6558 из Lecture Notes in Computer Science, стр. 180-196. Springer, (2011)Analyzing Privacy Loss in Updates of Natural Language Models., , , , и . CoRR, (2019)Formal certification of code-based cryptographic proofs., , и . POPL, стр. 90-101. ACM, (2009)Probabilistic relational reasoning for differential privacy., , , и . POPL, стр. 97-110. ACM, (2012)EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider., , , , , , , , , и 6 other автор(ы). SP, стр. 983-1002. IEEE, (2020)A Formal Specification of the MIDP 2.0 Security Model., , и . Formal Aspects in Security and Trust, том 4691 из Lecture Notes in Computer Science, стр. 220-234. Springer, (2006)Grey-box Extraction of Natural Language Models., , , и . ICML, том 139 из Proceedings of Machine Learning Research, стр. 12278-12286. PMLR, (2021)Fully automated analysis of padding-based encryption in the computational model., , , , , , и . ACM Conference on Computer and Communications Security, стр. 1247-1260. ACM, (2013)Computer-Aided Cryptographic Proofs., , и . SAS, том 7460 из Lecture Notes in Computer Science, стр. 1-2. Springer, (2012)