From post

EKE Meets Tight Security in the Universally Composable Framework.

, , , и . Public Key Cryptography (1), том 13940 из Lecture Notes in Computer Science, стр. 685-713. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Remote Sensing Image Fusion Based on Two-Stream Fusion Network., , и . MMM (1), том 10704 из Lecture Notes in Computer Science, стр. 428-439. Springer, (2018)Psgan: A Generative Adversarial Network for Remote Sensing Image Pan-Sharpening., , и . ICIP, стр. 873-877. IEEE, (2018)Protecting Sensitive Relationships against Inference Attacks in Social Networks., и . DASFAA (1), том 7238 из Lecture Notes in Computer Science, стр. 335-350. Springer, (2012)Gradient Descent on Multilevel Spin-Orbit Synapses with Tunable Variations., , , , , , и . Adv. Intell. Syst., 3 (6): 2000182 (2021)Blockchain Governance via Sharp Anonymous Multisignatures., , и . IACR Cryptol. ePrint Arch., (2023)Virtual Rehabilitation Service for Upper Amputees Based on Computer-Aided Environment.. HCI (40), том 1583 из Communications in Computer and Information Science, стр. 83-89. Springer, (2022)Spatio-Temporal Features Based Sensitive Relationship Protection in Social Networks., , , , , и . WISA, том 11242 из Lecture Notes in Computer Science, стр. 330-343. Springer, (2018)Segmentation of Five Components in Four Chamber View of Fetal Echocardiography., , , , , , , , , и 1 other автор(ы). ISBI, стр. 1962-1965. IEEE, (2020)A Generalization Based Approach for Anonymizing Weighted Social Network Graphs., и . WAIM, том 6897 из Lecture Notes in Computer Science, стр. 118-130. Springer, (2011)EKE Meets Tight Security in the Universally Composable Framework., , , и . Public Key Cryptography (1), том 13940 из Lecture Notes in Computer Science, стр. 685-713. Springer, (2023)