From post

Secure Deterministic Automata Evaluation: Completeness and Efficient 2-party Protocols.

, , и . SECITC, том 12001 из Lecture Notes in Computer Science, стр. 50-64. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure Deterministic Automata Evaluation: Completeness and Efficient 2-party Protocols., , и . SECITC, том 12001 из Lecture Notes in Computer Science, стр. 50-64. Springer, (2019)Byzantine replication under attack., , , и . DSN, стр. 197-206. IEEE Computer Society, (2008)Load balancing and locality in range-queriable data structures., , и . PODC, стр. 115-124. ACM, (2004)Privacy-Preserving Deterministic Automata Evaluation with Encrypted Data Blocks., , и . DPM/CBT@ESORICS, том 10436 из Lecture Notes in Computer Science, стр. 275-294. Springer, (2017)Improving the Efficacy of ACR TI-RADS Through Deep Learning-Based Descriptor Augmentation., , , , , , , , , и . J. Digit. Imaging, 36 (6): 2392-2401 (декабря 2023)Efficient Computations over Encrypted Data Blocks., , и . MFCS (2), том 9235 из Lecture Notes in Computer Science, стр. 274-286. Springer, (2015)Customizable Fault Tolerance for Wide-Area Replication., , , и . SRDS, стр. 65-82. IEEE Computer Society, (2007)Prime: Byzantine Replication under Attack., , , и . IEEE Trans. Dependable Secur. Comput., 8 (4): 564-577 (2011)Secret Handshakes with Dynamic and Fuzzy Matching., , и . NDSS, The Internet Society, (2007)Paxos for System Builders: an overview., и . LADIS, стр. 3:1-3:6. ACM, (2008)