From post

Patient-Centric Health Data Sovereignty: An Approach Using Proxy Re-Encryption.

, , , и . ESORICS Workshops (1), том 14398 из Lecture Notes in Computer Science, стр. 199-215. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Open and Interactive Learning Resources for Algorithmic Problem Solving., и . FM Workshops (2), том 12233 из Lecture Notes in Computer Science, стр. 200-208. Springer, (2019)Patient-Centric Health Data Sovereignty: An Approach Using Proxy Re-Encryption., , , и . ESORICS Workshops (1), том 14398 из Lecture Notes in Computer Science, стр. 199-215. Springer, (2023)DifFuzzAR: automatic repair of timing side-channel vulnerabilities via refactoring., , , и . Autom. Softw. Eng., 31 (1): 1 (июня 2024)Exploring Automatic Specification Repair in Dafny Programs., , и . ASEW, стр. 105-112. IEEE, (2023)Polyglot Code Smell Detection for Infrastructure as Code with GLITCH., , , , и . ASE, стр. 2042-2045. IEEE, (2023)Leveraging Large Language Models to Boost Dafny's Developers Productivity., , и . FormaliSE@ICSE, стр. 138-142. ACM, (2024)Evaluating the Accuracy of Password Strength Meters using Off-The-Shelf Guessing Attacks., , и . ISSRE Workshops, стр. 237-242. IEEE, (2020)Extending EcoAndroid with Automated Detection of Resource Leaks., , , и . MOBILESoft, стр. 17-27. IEEE, (2022)Verified Password Generation from Password Composition Policies., , , , и . IFM, том 13274 из Lecture Notes in Computer Science, стр. 271-288. Springer, (2022)Automatic Repair of Java Code with Timing Side-Channel Vulnerabilities., , и . ASE Workshops, стр. 1-8. IEEE, (2021)