From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fast Distributed RSA Key Generation for Semi-honest and Malicious Adversaries., , , и . CRYPTO (2), том 10992 из Lecture Notes in Computer Science, стр. 331-361. Springer, (2018)High-Throughput Secure AES Computation., , , , и . WAHC@CCS, стр. 13-24. ACM, (2018)How to (not) Share a Password: Privacy Preserving Protocols for Finding Heavy Hitters with Adversarial Behavior., , и . ACM Conference on Computer and Communications Security, стр. 1369-1386. ACM, (2019)Fast Garbling of Circuits Under Standard Assumptions., , , и . ACM Conference on Computer and Communications Security, стр. 567-578. ACM, (2015)Cryptographic Techniques for Privacy-Preserving Data Mining.. SIGKDD Explor., 4 (2): 12-19 (2002)Escrow services and incentives in peer-to-peer networks., , и . EC, стр. 85-94. ACM, (2001)Flaw Label: Exploiting IPv6 Flow Label., , и . SP, стр. 1259-1276. IEEE, (2020)Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters., , , , , , , и . CCS, стр. 125-138. ACM, (2022)Practical Multi-party Private Set Intersection from Symmetric-Key Techniques., , , , и . CCS, стр. 1257-1272. ACM, (2017)DNS Cache-Based User Tracking., и . NDSS, The Internet Society, (2019)