From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Computing Mod Without Mod., и . IACR Cryptology ePrint Archive, (2014)A guide to homomorphic encryption., и . The Cloud Security Ecosystem, Elsevier, (2015)Progger: An Efficient, Tamper-Evident Kernel-Space Logger for Cloud Data Provenance Tracking., и . IEEE CLOUD, стр. 881-889. IEEE Computer Society, (2014)Visualizing the New Zealand Cyber Security Challenge for Attack Behaviors., , , , , и . TrustCom/BigDataSE/ICESS, стр. 1123-1130. IEEE Computer Society, (2017)Computing Mod with a Variable Lookup Table., и . SSCC, том 625 из Communications in Computer and Information Science, стр. 3-17. Springer, (2016)Secure FPGA as a Service - Towards Secure Data Processing by Physicalizing the Cloud., и . TrustCom/BigDataSE/ICESS, стр. 449-455. IEEE Computer Society, (2017)Secure Voting in the Cloud Using Homomorphic Encryption and Mobile Agents., , , и . ICCCRI, стр. 173-184. IEEE Computer Society, (2015)Privacy Preserving Computation by Fragmenting Individual Bits and Distributing Gates., , и . Trustcom/BigDataSE/ISPA, стр. 900-908. IEEE, (2016)Bin Encoding: A User-Centric Secure Full-Text Searching Scheme for the Cloud., , и . TrustCom/BigDataSE/ISPA (1), стр. 563-570. IEEE, (2015)Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography., , и . TrustCom/BigDataSE/ICESS, стр. 1024-1031. IEEE Computer Society, (2017)