From post

Fast Confidential Search for Bio-Medical Data Using Bloom Filters and Homomorphic Cryptography

, , , и . 2012 IEEE Eighth International Conference on eScience, 2012 IEEE Eighth International Conference on eScience, Los Alamitos, CA, USA, IEEE Computer Society, IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Continual planning for cross-modal situated clarification in human-robot interaction., , и . RO-MAN, стр. 592-597. IEEE, (2008)Situation-Aware Interpretation, Planning and Execution of User Commands by Autonomous Robots.. RO-MAN, стр. 540-545. IEEE, (2007)Secret Program Execution in the Cloud applying Homomorphic Encryption, , , и . Proc. of 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011), pp. 114-119, (2011)Die Agenturen im recht der Europäischen Union - Segen oder Fluch?. Europa im Wandel, Heymanns, Köln, (2008)Das Risiko im öffentlichen Recht, и . Zeitschrift für öffentliches Recht und Verwaltungswissenschaft, (2003)B71-4 Mathematical Programming in Practice.. IEEE Trans. Computers, 20 (10): 1222 (1971)Multiagent Planning with Partially Ordered Temporal Plans.. IJCAI, стр. 1513-1514. Morgan Kaufmann, (2003)The Explorer System, , , , , , и . Cognitive Systems, Springer, (2010)Poster: Caching Oblivious Memory Access - An Extension to the HCRYPT Virtual Machine, и . Proceedings of the 20th ACM Conference on Computer and Communications Security (ACM CCS 2013), ACM, Sheridan, (ноября 2013)WAHC'18: 6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography., и . ACM Conference on Computer and Communications Security, стр. 2183-2184. ACM, (2018)