From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Constraint Satisfaction Cryptanalysis of Bloom Filters in Private Record Linkage., , , и . PETS, том 6794 из Lecture Notes in Computer Science, стр. 226-245. Springer, (2011)Leveraging Unique CPS Properties to Design Better Privacy-Enhancing Algorithms., , и . HotSoS, стр. 1-12. ACM, (2017)Assuring privacy when big brother is watching., и . DMKD, стр. 88-93. ACM, (2003)SEMROD: Secure and Efficient MapReduce Over HybriD Clouds., , , и . SIGMOD Conference, стр. 153-166. ACM, (2015)Automatic sanitization of social network data to prevent inference attacks., и . WWW (Companion Volume), стр. 55-56. ACM, (2011)A Hybrid Technique for Private Location-Based Queries with Database Protection., , , и . SSTD, том 5644 из Lecture Notes in Computer Science, стр. 98-116. Springer, (2009)Query Optimization in Encrypted Relational Databases by Vertical Schema Partitioning., , и . Secure Data Management, том 5776 из Lecture Notes in Computer Science, стр. 1-16. Springer, (2009)Secure Data Provenance and Inference Control with Semantic Web., , , и . CRC Press, (2014)SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors., , , и . CCS, стр. 1211-1228. ACM, (2017)Topological Anomaly Detection in Dynamic Multilayer Blockchain Networks., , , , и . ECML/PKDD (1), том 12975 из Lecture Notes in Computer Science, стр. 788-804. Springer, (2021)