From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Resilient Rights Protection for Sensor Streams., , и . VLDB, стр. 732-743. Morgan Kaufmann, (2004)Secure Authenticated Comparisons., , и . ACNS, том 6715 из Lecture Notes in Computer Science, стр. 514-531. (2011)Pattern Matching Image Compression: Algorithmic and Empirical Results., , и . IEEE Trans. Pattern Anal. Mach. Intell., 21 (7): 614-627 (1999)Security and privacy risks in electronic communications: A user's assessment., , , и . UEMCON, стр. 412-417. IEEE, (2017)Rights Protection for Relational Data., , и . IEEE Trans. Knowl. Data Eng., 16 (12): 1509-1525 (2004)Attribute-Based Access Control with Hidden Policies and Hidden Credentials., , и . IEEE Trans. Computers, 55 (10): 1259-1270 (2006)Applications of a Numbering Scheme for Polygonal Obstacles in the Plane., и . ISAAC, том 1178 из Lecture Notes in Computer Science, стр. 1-24. Springer, (1996)Computational Geometry for Uncertain Data - (Abstract of Keynote Talk).. FAW, том 6213 из Lecture Notes in Computer Science, стр. 6. Springer, (2010)Secure Outsourcing of Sequence Comparisons., и . Privacy Enhancing Technologies, том 3424 из Lecture Notes in Computer Science, стр. 63-78. Springer, (2004)Genuinity Signatures: Designing Signatures for Verifying 3D Object Genuinity., и . Comput. Graph. Forum, 28 (2): 437-446 (2009)