From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Constants Count: Practical Improvements to Oblivious RAM., , , , , , и . USENIX Security Symposium, стр. 415-430. USENIX Association, (2015)Identifying Scams and Trends., , , и . Understanding Social Engineering Based Scams, Springer, (2016)Streaming Authenticated Data Structures., , , и . EUROCRYPT, том 7881 из Lecture Notes in Computer Science, стр. 353-370. Springer, (2013)Lower bounds for external memory integer sorting via network coding., , , и . STOC, стр. 997-1008. ACM, (2019)Optimal Lower Bound for Differentially Private Multi-party Aggregation., , и . ESA, том 7501 из Lecture Notes in Computer Science, стр. 277-288. Springer, (2012)Circuit OPRAM: Unifying Statistically and Computationally Secure ORAMs and OPRAMs., и . TCC (2), том 10678 из Lecture Notes in Computer Science, стр. 72-107. Springer, (2017)Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies., , и . Public Key Cryptography, том 7293 из Lecture Notes in Computer Science, стр. 413-430. Springer, (2012)Portcullis: protecting connection setup from denial-of-capability attacks., , , , , и . SIGCOMM, стр. 289-300. ACM, (2007)Efficient Dynamic Proof of Retrievability for Cold Storage., , , , и . IACR Cryptol. ePrint Arch., (2022)IPDL: A Simple Framework for Formally Verifying Distributed Cryptographic Protocols., , , , и . IACR Cryptol. ePrint Arch., (2021)