From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The excessive power of Ctrl+C and Ctrl+V in CS research and career development., и . ACM Crossroads, 24 (2): 10-11 (2017)Privacy-oriented dependency via deniable SIGMA protocol., , , и . Comput. Secur., (2018)Proxy Signcryption Scheme for Vehicle Infrastructure Immune to Randomness Leakage and Setup Attacks., , , и . NCA, стр. 1-8. IEEE, (2020)QUEST: Privacy-Preserving Monitoring of Network Data., , , , , , и . SERVICES, стр. 21. IEEE, (2022)Signature Based Authentication for Ephemeral Setup Attacks in Vehicular Sensor Networks., , и . NCA, стр. 1-4. IEEE, (2019)Obscure: Information-Theoretic Oblivious and Verifiable Aggregation Queries., , , , , и . Proc. VLDB Endow., 12 (9): 1030-1043 (2019)CANOPY: A Verifiable Privacy-Preserving Token Ring-Based Communication Protocol for Smart Homes., , , , и . ACM Trans. Cyber Phys. Syst., 5 (1): 3:1-3:34 (2021)Trustworthy Privacy Policy Translation in Untrusted IoT Environments., , , и . IoTBDS, стр. 132-143. SciTePress, (2018)Verifiable Round-Robin Scheme for Smart Homes., , , , и . CODASPY, стр. 49-60. ACM, (2019)Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries., , , , и . CODASPY, стр. 165-167. ACM, (2020)Due to the escalation of the COVID-19 situation around the world, CODASPY'20 was postponed to early fall 2020..