Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transport mode assessment for inbound logistics: A study based on coffee industry., , , , and . SMC, page 1318-1323. IEEE, (2014)Information-Theoretically Secure String Commitments Based on Packet Reordering Channels., , , and . IEEE Access, (2021)Cost-adaptive Neural Networks for Peak Volume Prediction with EMM Filtering., , , and . IEEE BigData, page 4208-4213. IEEE, (2019)Road network compression techniques in spatiotemporal embedded systems: a survey., , , , , and . IWGS, page 33-36. ACM, (2014)Efficient fully simulatable oblivious transfer from the McEliece assumptions., and . ITW, page 638-642. IEEE, (2011)On the Oblivious Transfer Capacity of the Erasure Channel., , and . ISIT, page 1428-1431. IEEE, (2006)Performability Assessment of a Government Process in the Cloud., , , , , and . SMC, page 87-92. IEEE, (2015)Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems., , , and . IACR Cryptology ePrint Archive, (2009)Enhancing Peak Network Traffic Prediction via Time-Series Decomposition., , , and . CoRR, (2023)Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation., , , , and . IACR Cryptol. ePrint Arch., (2021)