From post

Privacy Preserving Collaborative Business Process Management.

, и . Business Process Management Workshops, том 4928 из Lecture Notes in Computer Science, стр. 306-315. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Intelligence for Broadcast : Threat Analytics.. IACR Cryptology ePrint Archive, (2015)Mobile Commerce: Secure Multi-party Computation & Financial Cryptography.. IACR Cryptology ePrint Archive, (2016)Privacy Preserving Collaborative Business Process Management., и . Business Process Management Workshops, том 4928 из Lecture Notes in Computer Science, стр. 306-315. Springer, (2007)Automated detection and classification of mass from breast ultrasound images., , , , , и . NCVPRIPG, стр. 1-4. IEEE, (2015)Generation of all rooted trees up to a given height., , и . Innov. Syst. Softw. Eng., 20 (3): 467-475 (сентября 2024)Secure Multi-party Computation: How to Solve the Problem between Security Intelligence & Business Intelligence.. IACR Cryptology ePrint Archive, (2015)Financial Cryptography: Algorithmic Mechanisms for a Hedonic Game.. IACR Cryptology ePrint Archive, (2015)Financial Cryptography: Discriminatory Pricing Mechanism.. IACR Cryptology ePrint Archive, (2015)Jointly learning to align and transcribe using attention-based alignment and uncertainty-to-weigh losses., , , , , и . SPCOM, стр. 1-5. IEEE, (2020)Algorithmic Mechanism Construction bridging Secure Multiparty Computation and Intelligent Reasoning.. IACR Cryptology ePrint Archive, (2016)