From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT., , , , и . USENIX Security Symposium, стр. 1519-1536. USENIX Association, (2019)Ghostor: Toward a Secure Data-Sharing System from Decentralized Trust., , и . NSDI, стр. 851-877. USENIX Association, (2020)MAGE: Nearly Zero-Cost Virtual Memory for Secure Computation., , и . OSDI, стр. 367-385. USENIX Association, (2021)Oblivious coopetitive analytics using hardware enclaves., , , , и . EuroSys, стр. 39:1-39:17. ACM, (2020)MiniCrypt: Reconciling Encryption and Compression for Big Data Stores., , , , и . EuroSys, стр. 191-204. ACM, (2017)Helen: Maliciously Secure Coopetitive Learning for Linear Models., , , и . IEEE Symposium on Security and Privacy, стр. 724-738. IEEE, (2019)PPMLP 2020: Workshop on Privacy-Preserving Machine Learning In Practice., , , , и . CCS, стр. 2139-2140. ACM, (2020)Delphi: A Cryptographic Inference Service for Neural Networks., , , , и . IACR Cryptol. ePrint Arch., (2020)ELSA: Secure Aggregation for Federated Learning with Malicious Actors., , , и . SP, стр. 1961-1979. IEEE, (2023)Visor: Privacy-Preserving Video Analytics as a Cloud Service., , , , и . USENIX Security Symposium, стр. 1039-1056. USENIX Association, (2020)