Author of the publication

Practical Everlasting Privacy.

, , , and . POST, volume 7796 of Lecture Notes in Computer Science, page 21-40. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ideal Agents Sharing (some!) Knowledge., and . ECAI, page 557-561. John Wiley and Sons, (1998)Practical machine learning with python on DSX., , , , , and . CASCON, page 403-405. ACM, (2018)Representing Defaults as Sentences with Reduced Priority.. KR, page 649-660. Morgan Kaufmann, (1992)Implementing an ethical approach to big data analytics in assistive robotics for elderly with dementia., , , and . SIGCAS Comput. Soc., 45 (3): 280-286 (2015)A Malware-Tolerant, Self-Healing Industrial Control System Framework., , and . SEC, volume 502 of IFIP Advances in Information and Communication Technology, page 46-60. Springer, (2017)Context-Aware Monitoring of Untrusted Mobile Applications., and . MobiSec, volume 17 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 83-96. Springer, (2009)Monitoring the Execution of Third-Party Software on Mobile Devices., and . RAID, volume 5230 of Lecture Notes in Computer Science, page 410-411. Springer, (2008)A New Algorithm for Strategy Synthesis in LTL Games., , and . TACAS, volume 3440 of Lecture Notes in Computer Science, page 477-492. Springer, (2005)Mixed-Depth Representations of Natural Language Text, and . Text-Based Intelligent Systems: Current research and practice in information extraction and retrieval, Lawrence Erlbaum, Hillsdale (New Jersey), Hove and London, (1992)Counterfactuals and Updates as Inverse Modalities., , and . TARK, page 163-173. Morgan Kaufmann, (1996)