From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme., , , , и . IACR Cryptology ePrint Archive, (2018)An FPGA co-processor implementation of Homomorphic Encryption., , , и . HPEC, стр. 1-6. IEEE, (2014)Practical implementations of program obfuscators for point functions., , , , , и . HPCS, стр. 460-467. IEEE, (2016)Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme., , , , и . IEEE Trans. Emerg. Top. Comput., 9 (2): 941-956 (2021)Securing Classifiers Against Both White-Box and Black-Box Attacks using Encrypted-Input Obfuscation., , , , , и . CCSW, стр. 167. ACM, (2020)Securely Sharing Encrypted Medical Information., , , и . CHASE, стр. 330-331. IEEE Computer Society, (2016)A Survey of Security Concepts for Common Operating Environments., , , и . ISORC Workshops, стр. 244-253. IEEE Computer Society, (2011)SHARD. (2010)WAHC'18: 6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography., и . ACM Conference on Computer and Communications Security, стр. 2183-2184. ACM, (2018)Stochastic behavior of random constant scanning worms., и . ICCCN, стр. 339-344. IEEE, (2005)