From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Practical and Privacy-Preserving Policy Compliance for Outsourced Data., , , , , и . Financial Cryptography Workshops, том 8438 из Lecture Notes in Computer Science, стр. 181-194. Springer, (2014)Systematizing Secure Computation for Research and Decision Support., , , и . SCN, том 8642 из Lecture Notes in Computer Science, стр. 380-397. Springer, (2014)Generating Synthetic Population., , и . CoRR, (2022)Fast and Secure Oblivious Stable Matching over Arithmetic Circuits., , , , и . IACR Cryptol. ePrint Arch., (2023)Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values., , , и . CCS, стр. 582-596. ACM, (2014)SimSAM: Simple Siamese Representations Based Semantic Affinity Matrix for Unsupervised Image Segmentation., , , и . CoRR, (2024)India's Äadhaar" Biometric ID: Structure, Security, and Vulnerabilities., , , , , , и . Financial Cryptography, том 13411 из Lecture Notes in Computer Science, стр. 672-693. Springer, (2022)Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation., , , , и . EuroS&P, стр. 112-127. IEEE, (2016)Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation., , , , и . Financial Cryptography Workshops, том 9604 из Lecture Notes in Computer Science, стр. 302-318. Springer, (2016)Trenchcoat: Human-Computable Hashing Algorithms for Password Generation., , и . CoRR, (2023)