Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme., , , , and . IACR Cryptology ePrint Archive, (2018)An FPGA co-processor implementation of Homomorphic Encryption., , , and . HPEC, page 1-6. IEEE, (2014)Practical implementations of program obfuscators for point functions., , , , , and . HPCS, page 460-467. IEEE, (2016)Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme., , , , and . IEEE Trans. Emerg. Top. Comput., 9 (2): 941-956 (2021)Securing Classifiers Against Both White-Box and Black-Box Attacks using Encrypted-Input Obfuscation., , , , , and . CCSW, page 167. ACM, (2020)Securely Sharing Encrypted Medical Information., , , and . CHASE, page 330-331. IEEE Computer Society, (2016)A Survey of Security Concepts for Common Operating Environments., , , and . ISORC Workshops, page 244-253. IEEE Computer Society, (2011)The detection of RCS worm epidemics., and . WORM, page 81-86. ACM Press, (2005)Homomorphic Encryption for Privacy-Preserving Genome Sequences Search., , and . SMARTCOMP, page 7-12. IEEE, (2019)Stochastic behavior of random constant scanning worms., and . ICCCN, page 339-344. IEEE, (2005)