From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Strength of Weak Randomization: Easily Deployable, Efficiently Searchable Encryption with Minimal Leakage., , и . DSN, стр. 517-529. IEEE, (2019)The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption., и . ACM Conference on Computer and Communications Security, стр. 1341-1352. ACM, (2016)Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption., , , , , , , и . NDSS, The Internet Society, (2019)Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces., , , , и . NDSS, The Internet Society, (2007)Inference Attacks on Property-Preserving Encrypted Databases., , и . CCS, стр. 644-655. ACM, (2015)Taming the Devil: Techniques for Evaluating Anonymized Network Data., , , , и . NDSS, The Internet Society, (2008)Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations., , , , и . SP, стр. 35-49. IEEE Computer Society, (2008)Thumbnail-Preserving Encryption for JPEG., , и . IH&MMSec, стр. 141-146. ACM, (2015)Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob?, , , и . USENIX Security Symposium, USENIX Association, (2007)On Web Browsing Privacy in Anonymized NetFlows., , , , и . USENIX Security Symposium, USENIX Association, (2007)