From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Verifiable Round-Robin Scheme for Smart Homes., , , , и . CODASPY, стр. 49-60. ACM, (2019)Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries., , , , и . CODASPY, стр. 165-167. ACM, (2020)Due to the escalation of the COVID-19 situation around the world, CODASPY'20 was postponed to early fall 2020..PRISM: Private Verifiable Set Computation over Multi-Owner Outsourced Databases., , , , , и . SIGMOD Conference, стр. 1116-1128. ACM, (2021)Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries on Secret-Shared Outsourced Data - Full Version., , , , , и . CoRR, (2020)Self-stabilizing End-to-End Communication in (Bounded Capacity, Omitting, Duplicating and non-FIFO) Dynamic Networks - (Extended Abstract)., , , и . SSS, том 7596 из Lecture Notes in Computer Science, стр. 133-147. Springer, (2012)Advances in Cryptography and Secure Hardware for Data Outsourcing., , и . ICDE, стр. 1798-1801. IEEE, (2020)Assignment of Different-Sized Inputs in MapReduce., , , , и . DISC, том 8784 из Lecture Notes in Computer Science, стр. 536-537. Springer, (2014)Computing Marginals Using MapReduce: Keynote talk paper., , , и . IDEAS, стр. 12-23. ACM, (2016)Scalable, On-Demand Secure Multiparty Computation for Privacy-Aware Blockchains., и . BlockSys, том 1156 из Communications in Computer and Information Science, стр. 196-211. Springer, (2019)Hiding Access-pattern is Not Enough! Veil: A Storage and Communication Efficient Volume-Hiding Algorithm., , , , и . CoRR, (2023)