From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases., , и . IEEE Trans. Parallel Distributed Syst., 25 (2): 437-446 (2014)SNP calling by sequencing pooled samples., , , , , и . BMC Bioinform., (2012)Analyses of Secure Automotive Communication Protocols and Their Impact on Vehicles Life-Cycle., , и . SMARTCOMP, стр. 452-457. IEEE Computer Society, (2018)Decomposing the Site Frequency Spectrum: The Impact of Tree Topology on Neutrality Tests, , , , и . Genetics, 207 (1): 229--240 (2017)Implementation of Verified Set Operation Protocols Based on Bilinear Accumulators., , и . CANS, том 10052 из Lecture Notes in Computer Science, стр. 626-636. (2016)How (not) to Index Order Revealing Encrypted Databases., , , и . ITASEC, том 3488 из CEUR Workshop Proceedings, CEUR-WS.org, (2023)Practical Evaluation of Graph Neural Networks in Network Intrusion Detection., , , , , и . ITASEC, том 3488 из CEUR Workshop Proceedings, CEUR-WS.org, (2023)Scalable, Confidential and Survivable Software Updates., , и . IEEE Trans. Parallel Distributed Syst., 33 (1): 176-191 (2022)An experimental analysis of ECQV implicit certificates performance in VANETs., , , и . VTC Fall, стр. 1-6. IEEE, (2020)Enforcing Correct Behavior without Trust in Cloud Key-Value Databases., , , и . CSCloud, стр. 157-164. IEEE Computer Society, (2015)