From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient integrity checking of untrusted network storage., , , и . StorageSS, стр. 43-54. ACM, (2008)The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution., , и . IACR Cryptology ePrint Archive, (2019)Optimal Verification of Operations on Dynamic Sets., , и . CRYPTO, том 6841 из Lecture Notes in Computer Science, стр. 91-110. Springer, (2011)Generalized cuckoo hashing with a stash, revisited., и . Inf. Process. Lett., (марта 2023)Single Server PIR with Sublinear Amortized Time and Polylogarithmic Bandwidth., и . IACR Cryptol. ePrint Arch., (2022)Batching, Aggregation, and Zero-Knowledge Proofs in Bilinear Accumulators., , , и . CCS, стр. 2719-2733. ACM, (2022)vRAM: Faster Verifiable RAM with Program-Independent Preprocessing., , , , и . IEEE Symposium on Security and Privacy, стр. 908-925. IEEE Computer Society, (2018)vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases., , , , и . IEEE Symposium on Security and Privacy, стр. 863-880. IEEE Computer Society, (2017)Multi-Server Doubly Efficient PIR., , , и . IACR Cryptol. ePrint Arch., (2024)Single Pass Client-Preprocessing Private Information Retrieval., и . USENIX Security Symposium, USENIX Association, (2024)