From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Protocol for Privately Reporting Ad Impressions at Scale., , и . ACM Conference on Computer and Communications Security, стр. 1591-1601. ACM, (2016)Don't Talk to Strangers - On the Challenges of Intelligent Vehicle Authentication., и . VEHITS, стр. 522-528. SciTePress, (2018)Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage., , , , и . USENIX Security Symposium, стр. 655-672. USENIX Association, (2016)Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers., , и . NDSS, The Internet Society, (2019)Charm: A Framework for Rapidly Prototyping Cryptosystems., , и . NDSS, The Internet Society, (2012)Blogging birds: Generating narratives about reintroduced species to promote public engagement., , , , и . INLG, стр. 120-124. The Association for Computer Linguistics, (2012)Downgrade Resilience in Key-Exchange Protocols., , , , , и . IEEE Symposium on Security and Privacy, стр. 506-525. IEEE Computer Society, (2016)Fluid MPC: Secure Multiparty Computation with Dynamic Participants., , , , и . CRYPTO (2), том 12826 из Lecture Notes in Computer Science, стр. 94-123. Springer, (2021)Selection of a time-varying quadratic Volterra model using a wavelet packet basis expansion., и . IEEE Trans. Signal Process., 52 (10): 2721-2728 (2004)BioSamples database: an updated sample metadata hub., , , , , , , , , и . Nucleic Acids Res., 47 (Database-Issue): D1172-D1178 (2019)