From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On detecting co-resident cloud instances using network flow watermarking techniques., , , , , и . Int. J. Inf. Sec., 13 (2): 171-189 (2014)Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values., , , и . CCS, стр. 582-596. ACM, (2014)Memory-Efficient Garbled Circuit Generation for Mobile Devices., , и . Financial Cryptography, том 7397 из Lecture Notes in Computer Science, стр. 254-268. Springer, (2012)Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values., , , и . CoRR, (2015)PAL: A pseudo assembly language for optimizing secure function evaluation in mobile devices., и . J. Inf. Secur. Appl., (2018)A Hybrid Approach to Secure Function Evaluation using SGX., , , , , , , и . AsiaCCS, стр. 100-113. ACM, (2019)Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation., , , , и . EuroS&P, стр. 112-127. IEEE, (2016)Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation., , , , и . Financial Cryptography Workshops, том 9604 из Lecture Notes in Computer Science, стр. 302-318. Springer, (2016)Towards secure provenance-based access control in cloud environments., , , и . CODASPY, стр. 277-284. ACM, (2013)Detecting co-residency with active traffic analysis techniques., , , , , и . CCSW, стр. 1-12. ACM, (2012)