From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Do Users Write More Insecure Code with AI Assistants?, , , и . CCS, стр. 2785-2799. ACM, (2023)Secure Complaint-Enabled Source-Tracking for Encrypted Messaging., , и . CCS, стр. 1484-1506. ACM, (2021)07381 Executive Summary - Cryptography., , , и . Cryptography, том 07381 из Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2007)The Case for Prefetching and Prevalidating TLS Server Certificates., , , , и . NDSS, The Internet Society, (2012)Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets., и . USENIX Security Symposium, стр. 4291-4308. USENIX Association, (2022)SANE: A Protection Architecture for Enterprise Networks., , , , , и . USENIX Security Symposium, USENIX Association, (2006)Scaling Verifiable Computation Using Efficient Set Accumulators., , , и . USENIX Security Symposium, стр. 2075-2092. USENIX Association, (2020)A Revocable Backup System., и . USENIX Security Symposium, USENIX Association, (1996)Powers-of-Tau to the People: Decentralizing Setup Ceremonies., , , и . ACNS (3), том 14585 из Lecture Notes in Computer Science, стр. 105-134. Springer, (2024)Making DNA computers error resistant., , , и . DNA Based Computers, том 44 из DIMACS Series in Discrete Mathematics and Theoretical Computer Science, стр. 163-170. DIMACS/AMS, (1996)