From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data., , , , , и . EuroS&P, стр. 90-108. IEEE, (2022)Data Protection Law and Multi-Party Computation: Applications to Information Exchange between Law Enforcement Agencies., , , и . WPES@CCS, стр. 69-82. ACM, (2022)Evaluating Leakage Attacks Against Relational Encrypted Search., , , и . IACR Cryptol. ePrint Arch., (2024)A Comment on Privacy-Preserving Scalar Product Protocols as Proposed in "SPOC"., и . IEEE Trans. Parallel Distributed Syst., 31 (3): 543-546 (2020)Privacy-Preserving Speaker Recognition with Cohort Score Normalisation., , , , , , , и . INTERSPEECH, стр. 2868-2872. ISCA, (2019)Examining Leakage of Access Counts in ORAM Constructions., , и . WPES@CCS, стр. 66-70. ACM, (2018)Examining Leakage from Access Counts in ORAM Constructions., , и . Krypto-Tag, Gesellschaft für Informatik e.V. / FG KRYPTO, (2018)Analyzing and Applying Cryptographic Mechanisms to Protect Privacy in Applications.. Technical University of Darmstadt, Germany, (2022)Preserving privacy in speaker and speech characterisation., , , , , , , , , и 9 other автор(ы). Comput. Speech Lang., (2019)Too Close for Comfort? Measuring Success of Sampled-Data Leakage Attacks Against Encrypted Search., , и . CCSW@CCS, стр. 3-15. ACM, (2023)