From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Comparison of Texts Streams in the Presence of Mild Adversaries., и . ACSW, том 44 из CRPIT, стр. 179-186. Australian Computer Society, (2005)Secure database-as-a-service with Cipherbase., , , , , , , , и . SIGMOD Conference, стр. 1033-1036. ACM, (2013)Proteus: virtualization for diversified tamper-resistance., , и . Digital Rights Management Workshop, стр. 47-58. ACM, (2006)Obfuscating straight line arithmetic programs., , и . Digital Rights Management Workshop, стр. 47-58. ACM, (2009)Coins, Weights and Contention in Balancing Networks., , и . PODC, стр. 193-205. ACM, (1994)Data structures for limited oblivious execution of programs while preserving locality of reference., , и . Digital Rights Management Workshop, стр. 63-69. ACM, (2007)The Long-Short-Key Primitive and Its Applications to Key Security., , , и . IWSEC, том 5312 из Lecture Notes in Computer Science, стр. 279-297. Springer, (2008)Information Flows in Encrypted Databases., , и . CoRR, (2016)Categorial and Non-Categorial Languages., и . ACL, стр. 75-77. ACL, (1986)Perturbation codes., и . Allerton, стр. 1403-1409. IEEE, (2008)