From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Efficient Two-Party ECDSA Scheme for Cryptocurrencies., , , и . ICISS, том 14424 из Lecture Notes in Computer Science, стр. 411-430. Springer, (2023)EdgeNet for efficient scene graph classification., , , , и . IJCNN, стр. 1-8. IEEE, (2022)Resilience to Denial-of-Service and Integrity Attacks: A Structured Systems Approach., , , , и . CoRR, (2021)Monotonic Signed Graph approach for cross-layer congestion control in wireless ad-hoc networks., , и . GLOBECOM Workshops, стр. 309-314. IEEE, (2011)Security and Privacy for Real Time Video Streaming Using Hierarchical Inner Product Encryption Based Publish-Subscribe Architecture., , , , , , и . AINA Workshops, стр. 373-380. IEEE Computer Society, (2016)Enterprise Post Quantum Cryptography Migration Tools., , , и . COMSNETS, стр. 327-329. IEEE, (2024)Robust Collaborative Fraudulent Transaction Detection using Federated Learning., , , и . ICMLA, стр. 373-378. IEEE, (2021)WiP: QoS Based Recommendation System for Efficient Private Inference of CNN Using FHE., , , , , и . ICISS, том 13146 из Lecture Notes in Computer Science, стр. 198-211. Springer, (2021)Secure and Privacy Preserving Method for Biometric Template Protection using Fully Homomorphic Encryption., , , , , и . TrustCom, стр. 1127-1134. IEEE, (2020)Lightweight IBE scheme for Wireless Sensor nodes., , , , и . IEEE ANTS, стр. 1-6. IEEE, (2013)