From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Comment on Privacy-Preserving Scalar Product Protocols as Proposed in "SPOC"., и . IEEE Trans. Parallel Distributed Syst., 31 (3): 543-546 (2020)Trustworthy AI Inference Systems: An Industry Research View., , , , , , , , , и 18 other автор(ы). CoRR, (2020)Privacy-Preserving Speaker Recognition with Cohort Score Normalisation., , , , , , , и . INTERSPEECH, стр. 2868-2872. ISCA, (2019)Privacy-preserving PLDA speaker verification using outsourced secure computation., , , , и . Speech Commun., (2019)MAPLE: MArkov Process Leakage attacks on Encrypted Search., , , , , и . Proc. Priv. Enhancing Technol., 2024 (1): 430-446 (января 2024)A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC"., и . CoRR, (2019)SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data., , , , , и . EuroS&P, стр. 90-108. IEEE, (2022)Data Protection Law and Multi-Party Computation: Applications to Information Exchange between Law Enforcement Agencies., , , и . WPES@CCS, стр. 69-82. ACM, (2022)Examining Leakage from Access Counts in ORAM Constructions., , и . Krypto-Tag, Gesellschaft für Informatik e.V. / FG KRYPTO, (2018)Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data., , , , , и . IACR Cryptol. ePrint Arch., (2021)