From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Applications of undeniable signature schemes., , , и . ICSIPA, стр. 133-138. IEEE, (2015)Notes on Two Flawed Attacks on Undeniable Signature Schemes., и . ICITCS, стр. 1-4. IEEE Computer Society, (2013)From Machine Learning to Machine Unlearning: Complying with GDPR's Right to be Forgotten while Maintaining Business Value of Predictive Models., , , , , и . CoRR, (2024)Lattice-Based Public Key Searchable Encryption from Experimental Perspectives., , и . IEEE Trans. Dependable Secur. Comput., 17 (6): 1269-1282 (2020)Towards Practical Post-quantum Signatures for Resource-Limited Internet of Things., и . ACSAC, стр. 119-130. ACM, (2021)High-Speed High-Security Public Key Encryption with Keyword Search., , и . DBSec, том 10359 из Lecture Notes in Computer Science, стр. 365-385. Springer, (2017)EW-Tune: A Framework for Privately Fine-Tuning Large Language Models with Differential Privacy., , , и . ICDM (Workshops), стр. 560-566. IEEE, (2022)MOSE: Practical Multi-User Oblivious Storage via Secure Enclaves., , , и . CODASPY, стр. 17-28. ACM, (2020)Due to the escalation of the COVID-19 situation around the world, CODASPY'20 was postponed to early fall 2020..Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme., , и . Mycrypt, том 10311 из Lecture Notes in Computer Science, стр. 474-477. Springer, (2016)The insecurity of a certificateless undeniable signature scheme., и . IWCMC, стр. 582-587. IEEE, (2016)