From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Verifiable Rotation of Homomorphic Encryptions., , , и . Public Key Cryptography, том 5443 из Lecture Notes in Computer Science, стр. 393-410. Springer, (2009)Practical Secure Decision Tree Learning in a Teletreatment Application., , , и . Financial Cryptography, том 8437 из Lecture Notes in Computer Science, стр. 179-194. Springer, (2014)Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming., , и . AFRICACRYPT, том 9646 из Lecture Notes in Computer Science, стр. 265-284. Springer, (2016)Privacy-Preserving Verification of Clinical Research., , , , , , и . Sicherheit, том P-228 из LNI, стр. 481-500. GI, (2013)Secure Multiparty Linear Programming Using Fixed-Point Arithmetic., и . ESORICS, том 6345 из Lecture Notes in Computer Science, стр. 134-150. Springer, (2010)Improved Primitives for Secure Multiparty Integer Computation., и . SCN, том 6280 из Lecture Notes in Computer Science, стр. 182-199. Springer, (2010)Flow-based reputation with uncertainty: Evidence-Based Subjective Logic., , и . CoRR, (2014)A Multi-layer Recursive Residue Number System., , , , и . ISIT, стр. 1460-1464. IEEE, (2018)