Author of the publication

Secure Outsourcing of DNA Searching via Finite Automata.

, and . DBSec, volume 6166 of Lecture Notes in Computer Science, page 49-64. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data-oblivious graph algorithms for secure computation and outsourcing., , and . AsiaCCS, page 207-218. ACM, (2013)Redefining Trust: Assessing Reliability of Machine Learning Algorithms in Intrusion Detection Systems., , , and . ISCAS, page 1-5. IEEE, (2024)Computing the Optimal Longest Queue Length in Torus Networks., , and . TPNC, volume 13082 of Lecture Notes in Computer Science, page 3-14. Springer, (2021)Secure Computation of Hidden Markov Models., and . SECRYPT, page 242-253. SciTePress, (2013)Global Attack and Remedy on IC-Specific Logic Encryption., , , , and . HOST, page 145-148. IEEE, (2022)Analysis of Reusability of Secure Sketches and Fuzzy Extractors., and . IEEE Trans. Inf. Forensics Secur., 8 (9): 1433-1445 (2013)Mitigating Autonomous Vehicle GPS Spoofing Attacks through Scene Text Observations., , , , , and . HICSS, page 6706-6715. ScholarSpace, (2023)Towards AI-Enabled Hardware Security: Challenges and Opportunities., , , , , , and . IOLTS, page 1-10. IEEE, (2022)Towards an Efficient Client Selection System for Federated Learning., , , , , and . CLOUD, volume 13731 of Lecture Notes in Computer Science, page 13-21. Springer, (2022)Secure Computation on Floating Point Numbers., , , and . NDSS, The Internet Society, (2013)