From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Perturbation codes., и . Allerton, стр. 1403-1409. IEEE, (2008)Oblivious Hashing: A Stealthy Software Integrity Verification Primitive., , , , , и . Information Hiding, том 2578 из Lecture Notes in Computer Science, стр. 400-414. Springer, (2002)Categorial and Non-Categorial Languages., и . ACL, стр. 75-77. ACL, (1986)Comparison of Texts Streams in the Presence of Mild Adversaries., и . ACSW, том 44 из CRPIT, стр. 179-186. Australian Computer Society, (2005)Information Flows in Encrypted Databases., , и . CoRR, (2016)Coins, Weights and Contention in Balancing Networks., , и . PODC, стр. 193-205. ACM, (1994)Data structures for limited oblivious execution of programs while preserving locality of reference., , и . Digital Rights Management Workshop, стр. 63-69. ACM, (2007)Proteus: virtualization for diversified tamper-resistance., , и . Digital Rights Management Workshop, стр. 47-58. ACM, (2006)Obfuscating straight line arithmetic programs., , и . Digital Rights Management Workshop, стр. 47-58. ACM, (2009)Secure database-as-a-service with Cipherbase., , , , , , , , и . SIGMOD Conference, стр. 1033-1036. ACM, (2013)