From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Poster: Cross-Layer Optimization for Low-power Wireless Coexistence., , , , и . SenSys, стр. 443-444. ACM, (2015)TimeCrypt: A Scalable Private Time Series Data Store., , , и . CoRR, (2018)CrossZig: Combating Cross-Technology Interference in Low-Power Wireless Networks., , , , и . IPSN, стр. 10:1-10:12. IEEE, (2016)Zeph: Cryptographic Enforcement of End-to-End Data Privacy., , , , и . OSDI, стр. 387-404. USENIX Association, (2021)Secure Sharing of Partially Homomorphic Encrypted IoT Data., , , , и . SenSys, стр. 29:1-29:14. ACM, (2017)Exploiting physical layer information to mitigate cross-technology interference effects on low-power wireless networks.. SenSys, стр. 23:1-23:2. ACM, (2013)SoK: Fully Homomorphic Encryption Compilers., , и . SP, стр. 1092-1108. IEEE, (2021)Poster Abstract: Low-Power Wireless Channel Quality Estimation in the Presence of RF Smog., , и . DCOSS, стр. 137-138. IEEE Computer Society, (2014)Privacy-preserving Quantified Self: Secure Sharing and Processing of Encrypted Small Data., и . MobiArch, стр. 25-30. ACM, (2017)Poster: come closer: proximity-based authentication for the internet of things., и . MobiCom, стр. 421-424. ACM, (2014)