From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A New Additive Homomorphic Encryption based on the co-ACD Problem., , и . ACM Conference on Computer and Communications Security, стр. 287-298. ACM, (2014)A wireless power transmission system for implantable devices in freely moving rodents., , , , , , и . Medical Biol. Eng. Comput., 52 (8): 639-651 (2014)UAV-Satellite Integration for Communication System: Potential Applications and Key Challenges., , , , , , , и . ICTC, стр. 663-665. IEEE, (2023)Correcting Errors in Private Keys Obtained from Cold Boot Attacks., , , и . ICISC, том 7259 из Lecture Notes in Computer Science, стр. 74-87. Springer, (2011)On the Efficiency of FHE-based Private Queries., , , и . IACR Cryptology ePrint Archive, (2015)Security Analysis of Multilinear Maps over the Integers., и . CRYPTO (1), том 8616 из Lecture Notes in Computer Science, стр. 224-240. Springer, (2014)Analysis of Discrete Logarithm Algorithm using Pre-computation., , и . IACR Cryptology ePrint Archive, (2011)Provably Secure Group Signature Schemes From Code-Based Assumptions., , , , и . IEEE Trans. Inf. Theory, 66 (9): 5754-5773 (2020)New RSA-Based Public Key Encryption with Authorized Equality Test., , , , , и . ICOIN, стр. 299-304. IEEE, (2024)A Survey on Epoch-based In-Memory Database Systems., , , и . ICTC, стр. 788-792. IEEE, (2023)