From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hidden Δ-fairness: A Novel Notion for Fair Secure Two-Party Computation., , , , и . IACR Cryptol. ePrint Arch., (2024)Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules., , , , , и . Proc. Priv. Enhancing Technol., 2021 (4): 312-338 (2021)Security in a Distributed Key Management Approach, , , , и . (2017)Composable Long-Term Security with Rewinding., , , , , , и . TCC (4), том 14372 из Lecture Notes in Computer Science, стр. 510-541. Springer, (2023)IT-Sicherheit - ein rechtsfreier Raum?, , и . Datenschutz und Datensicherheit, 42 (5): 286-290 (2018)Environmentally Friendly Composable Multi-party Computation in the Plain Model from Standard (Timed) Assumptions., , и . TCC (1), том 13042 из Lecture Notes in Computer Science, стр. 750-781. Springer, (2021)Secure Database Outsourcing to the Cloud: Side-Channels, Counter-Measures and Trusted Execution., и . CBMS, стр. 799-804. IEEE Computer Society, (2017)Secure Database Outsourcing to the Cloud: Side-Channels, Counter-Measures and Trusted Execution with SGX, и . (2017)Your Money or Your Life - Modeling and Analyzing the Security of Electronic Payment in the UC Framework., , , , , , , и . IACR Cryptol. ePrint Arch., (2019)SES-14: Sichere und zuverlässliche Systeme: Datensouveränität., , , , , и . GI-Jahrestagung, том P-307 из LNI, стр. 111-113. GI, (2020)