From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Functional encryption for computational hiding in prime order groups via pair encodings., , , и . Des. Codes Cryptogr., 86 (1): 97-120 (2018)Functional Encryption for Pattern Matching with a Hidden String., , , , и . Cryptogr., 6 (1): 1 (2022)Trojan Attacks and Defense for Speech Recognition., , , и . MobiSec, том 1544 из Communications in Computer and Information Science, стр. 195-210. Springer, (2021)P2DPI: Practical and Privacy-Preserving Deep Packet Inspection., , , , , и . AsiaCCS, стр. 135-146. ACM, (2021)Pattern Matching over Encrypted Data with a Short Ciphertext., , , , и . WISA, том 13009 из Lecture Notes in Computer Science, стр. 132-143. Springer, (2021)IPRemover: A Generative Model Inversion Attack against Deep Neural Network Fingerprinting and Watermarking., , , , , и . AAAI, стр. 7837-7845. AAAI Press, (2024)An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption., , , , и . AsiaCCS, стр. 823-834. ACM, (2017)Efficient Anonymous Multi-group Broadcast Encryption., , , , и . ACNS (1), том 12146 из Lecture Notes in Computer Science, стр. 251-270. Springer, (2020)Inspecting TLS Anytime Anywhere: A New Approach to TLS Interception., , и . AsiaCCS, стр. 116-126. ACM, (2020)Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof., , , и . WISA, том 11897 из Lecture Notes in Computer Science, стр. 206-216. Springer, (2019)