From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Constants Count: Practical Improvements to Oblivious RAM., , , , , , и . USENIX Security Symposium, стр. 415-430. USENIX Association, (2015)Identifying Scams and Trends., , , и . Understanding Social Engineering Based Scams, Springer, (2016)Streaming Authenticated Data Structures., , , и . EUROCRYPT, том 7881 из Lecture Notes in Computer Science, стр. 353-370. Springer, (2013)Circuit OPRAM: Unifying Statistically and Computationally Secure ORAMs and OPRAMs., и . TCC (2), том 10678 из Lecture Notes in Computer Science, стр. 72-107. Springer, (2017)Optimal Lower Bound for Differentially Private Multi-party Aggregation., , и . ESA, том 7501 из Lecture Notes in Computer Science, стр. 277-288. Springer, (2012)Lower bounds for external memory integer sorting via network coding., , , и . STOC, стр. 997-1008. ACM, (2019)Joint Link Prediction and Attribute Inference Using a Social-Attribute Network., , , , , , , и . ACM Trans. Intell. Syst. Technol., 5 (2): 27:1-27:20 (2014)Efficient Dynamic Proof of Retrievability for Cold Storage., , , , и . IACR Cryptol. ePrint Arch., (2022)IPDL: A Simple Framework for Formally Verifying Distributed Cryptographic Protocols., , , , и . IACR Cryptol. ePrint Arch., (2021)Solidus: Confidential Distributed Ledger Transactions via PVORM., , , , , и . CCS, стр. 701-717. ACM, (2017)