From post

Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data.

, , , и . Financial Cryptography, том 11598 из Lecture Notes in Computer Science, стр. 337-356. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

How to Bind Anonymous Credentials to Humans., , и . USENIX Security Symposium, стр. 3047-3064. USENIX Association, (2023)GhostBuster: understanding and overcoming the pitfalls of transient execution vulnerability checkers., , , , , и . SANER, стр. 307-317. IEEE, (2021)Two methods for exploiting speculative control flow hijacks., , , , и . WOOT @ USENIX Security Symposium, USENIX Association, (2019)Speculator: a tool to analyze speculative execution attacks and mitigations., , , , , и . ACSAC, стр. 747-761. ACM, (2019)Bypassing memory safety mechanisms through speculative control flow hijacks., , , , , и . CoRR, (2020)Trusted Computing Meets Blockchain: Rollback Attacks and a Solution for Hyperledger Fabric., , , и . SRDS, стр. 324-333. IEEE, (2019)Model-Driven Engineering for Multi-party Interactions on a Blockchain - An Example., , и . ICSOC Workshops, том 12019 из Lecture Notes in Computer Science, стр. 181-194. Springer, (2019)StreamChain: Building a Low-Latency Permissioned Blockchain For Enterprise Use-Cases., , , и . Blockchain, стр. 130-139. IEEE, (2021)Endorsement in Hyperledger Fabric., , , и . Blockchain, стр. 510-519. IEEE, (2019)Memory Categorization: Separating Attacker-Controlled Data., , и . DIMVA, том 11543 из Lecture Notes in Computer Science, стр. 263-287. Springer, (2019)