From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Index Structure for Private Data Outsourcing., и . DBSec, том 6818 из Lecture Notes in Computer Science, стр. 247-254. Springer, (2011)Secure Computation on Floating Point Numbers., , , и . IACR Cryptology ePrint Archive, (2012)Phylotastic! Making tree-of-life knowledge accessible, reusable and convenient., , , , , , , , , и 18 other автор(ы). BMC Bioinform., (2013)Ontological Vulnerability Assessment.. WISE Workshops, том 5176 из Lecture Notes in Computer Science, стр. 24-35. Springer, (2008)Data-oblivious graph algorithms for secure computation and outsourcing., , и . AsiaCCS, стр. 207-218. ACM, (2013)General secure sensor aggregation in the presence of malicious nodes., , и . ICDE, стр. 506-516. IEEE Computer Society, (2011)Reliable medical recommendation systems with patient privacy., , , и . ACM Trans. Intell. Syst. Technol., 4 (4): 67:1-67:31 (2013)Secure Computation on Floating Point Numbers., , , и . NDSS, The Internet Society, (2013)PICCO: a general-purpose compiler for private distributed computation., , и . ACM Conference on Computer and Communications Security, стр. 813-826. ACM, (2013)Widespread position-specific conservation of synonymous rare codons within coding sequences., , , , , , , , и . PLoS Comput. Biol., (2017)