From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies., , и . Public Key Cryptography, том 7293 из Lecture Notes in Computer Science, стр. 413-430. Springer, (2012)Streaming Authenticated Data Structures., , , и . EUROCRYPT, том 7881 из Lecture Notes in Computer Science, стр. 353-370. Springer, (2013)Circuit OPRAM: Unifying Statistically and Computationally Secure ORAMs and OPRAMs., и . TCC (2), том 10678 из Lecture Notes in Computer Science, стр. 72-107. Springer, (2017)Optimal Lower Bound for Differentially Private Multi-party Aggregation., , и . ESA, том 7501 из Lecture Notes in Computer Science, стр. 277-288. Springer, (2012)Identifying Scams and Trends., , , и . Understanding Social Engineering Based Scams, Springer, (2016)Constants Count: Practical Improvements to Oblivious RAM., , , , , , и . USENIX Security Symposium, стр. 415-430. USENIX Association, (2015)Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness., , , , и . ASIACRYPT (1), том 9452 из Lecture Notes in Computer Science, стр. 337-359. Springer, (2015)Towards Automated Safety Vetting of PLC Code in Real-World Plants., , , , , , , , , и 1 other автор(ы). IEEE Symposium on Security and Privacy, стр. 522-538. IEEE, (2019)Automating Efficient RAM-Model Secure Computation., , , , и . IEEE Symposium on Security and Privacy, стр. 623-638. IEEE Computer Society, (2014)Efficient Pre-processing PIR Without Public-Key Cryptography., , и . EUROCRYPT (6), том 14656 из Lecture Notes in Computer Science, стр. 210-240. Springer, (2024)