Author of the publication

Patient-Centric Health Data Sovereignty: An Approach Using Proxy Re-Encryption.

, , , and . ESORICS Workshops (1), volume 14398 of Lecture Notes in Computer Science, page 199-215. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Patient-Centric Health Data Sovereignty: An Approach Using Proxy Re-Encryption., , , and . ESORICS Workshops (1), volume 14398 of Lecture Notes in Computer Science, page 199-215. Springer, (2023)Exploring memory organization in virtual MP-SoC platforms., , , and . SBCCI, page 79-84. ACM, (2010)Using traditional loop unrolling to fit application on a new hybrid reconfigurable architecture., , , and . SAC, page 1552-1553. ACM, (2008)Using NoC routers as processing elements., , and . SBCCI, ACM, (2009)Pipelined Fast 2-D DCT Architecture for JPEG Image Compression., , and . SBCCI, page 226-231. IEEE Computer Society, (2001)A Systematic Methodology to Evaluate Prediction Models for Driving Style Classification., and . Sensors, 20 (6): 1692 (2020)X4CP32: A New Parallel/Reconfigurable General-Purpose Processor., , and . SBAC-PAD, page 260-268. IEEE Computer Society, (2003)A Memory Hierarchy Model Based on Data Reuse for Full-Search Motion Estimation on High-Definition Digital Videos., , and . Int. J. Reconfigurable Comput., (2012)Papílio Cryptography Algorithm., , , and . CIS, volume 3314 of Lecture Notes in Computer Science, page 928-933. Springer, (2004)An efficient memory hierarchy for full search motion estimation on high definition digital videos., , and . SBCCI, page 131-136. ACM, (2011)