From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Privacy-Enhancing Technologies for Medical Tests Using Genomic Data., , и . NDSS, The Internet Society, (2013)POSEIDON: Privacy-Preserving Federated Neural Network Learning., , , , , , и . NDSS, The Internet Society, (2021)The Inconvenient Truth about Web Certificates., , , и . WEIS, (2011)Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-sparse Keys., , , и . EUROCRYPT (1), том 12696 из Lecture Notes in Computer Science, стр. 587-617. Springer, (2021)Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels., , , , , и . IEEE Trans. Dependable Secur. Comput., 5 (4): 208-223 (2008)Key Agreement in Peer-to-Peer Wireless Networks., , и . Proc. IEEE, 94 (2): 467-478 (2006)Revocation games in ephemeral networks., , , и . ACM Conference on Computer and Communications Security, стр. 199-210. ACM, (2008)On genomics, kin, and privacy., , и . F1000Research, (2014)Scalable Privacy-Preserving Distributed Learning., , , , , , и . Proc. Priv. Enhancing Technol., 2021 (2): 323-347 (2021)The quest for security in mobile ad hoc networks., , и . MobiHoc, стр. 146-155. ACM, (2001)