From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Privacy-Preserving Evaluation of Generalization Error and Its Application to Model and Attribute Selection., и . ACML, том 5828 из Lecture Notes in Computer Science, стр. 338-353. Springer, (2009)Privacy Tradeoffs: Myth or Reality? Panel., , , , и . Financial Cryptography, том 2357 из Lecture Notes in Computer Science, стр. 147-151. Springer, (2002)Self-stabilizing Uncoupled Dynamics., , , и . SAGT, том 8768 из Lecture Notes in Computer Science, стр. 74-85. Springer, (2014)DP-WHERE: Differentially private modeling of human mobility., , , , и . IEEE BigData, стр. 580-588. IEEE Computer Society, (2013)Accountability and deterrence in online life., , , , и . WebSci, стр. 7:1-7:7. ACM, (2011)Guest Editorial: Special Issue on Computer and Communications Security., и . ACM Trans. Inf. Syst. Secur., 12 (2): 7:1-7:2 (2008)Privacy-Preserving Computation of Bayesian Networks on Vertically Partitioned Data., и . IEEE Trans. Knowl. Data Eng., 18 (9): 1253-1264 (2006)An Efficient Protocol for Unconditionally Secure Secret Key Exchange., и . SODA, стр. 475-483. ACM/SIAM, (1993)Strange Bedfellows: How and When to Work with Your Enemy (Transcript of Discussion).. Security Protocols Workshop, том 8809 из Lecture Notes in Computer Science, стр. 268-275. Springer, (2014)An Application of Game-Theoretic Techniques to Cryptography., и . Advances In Computational Complexity Theory, том 13 из DIMACS Series in Discrete Mathematics and Theoretical Computer Science, стр. 99-118. DIMACS/AMS, (1990)