From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Anonymity for Key-Trees with Adaptive Adversaries., и . SecureComm, том 96 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 409-425. Springer, (2011)Secure integer division with a private divisor., и . Proc. Priv. Enhancing Technol., 2021 (4): 339-349 (2021)Secure Multi-party Computation and Its Applications.. I4CS, том 1585 из Communications in Computer and Information Science, стр. 3-5. Springer, (2022)Privacy-preserving content-based recommender system., , , и . MM&Sec, стр. 77-84. ACM, (2012)Improved Anonymity for Key-Trees., и . RFIDSec, том 7739 из Lecture Notes in Computer Science, стр. 31-47. Springer, (2012)Privacy-Preserving Coupling of Vertically-Partitioned Databases and Subsequent Training with Gradient Descent., , , и . CSCML, том 12716 из Lecture Notes in Computer Science, стр. 38-51. Springer, (2021)A New Approach to Privacy-Preserving Clinical Decision Support Systems for HIV Treatment., , , , , , , , , и 2 other автор(ы). CoRR, (2018)Processing in the encrypted domain using a composite signal representation: Pros and cons., , , и . WIFS, стр. 176-180. IEEE, (2009)Towards Quantum-Safe VPNs and Internet., , , и . IACR Cryptology ePrint Archive, (2019)Recurrent Multiple-Repetition Coding for Channels With Feedback.. IEEE Trans. Inf. Theory, 57 (9): 5983-5990 (2011)