From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Tracking anonymous peer-to-peer VoIP calls on the internet., , и . CCS, стр. 81-91. ACM, (2005)An Empirical Study on the Membership Inference Attack against Tabular Data Synthesis Models., , , и . CIKM, стр. 4064-4068. ACM, (2022)Threat Modeling for Cloud Data Center Infrastructures., , , и . FPS, том 10128 из Lecture Notes in Computer Science, стр. 302-319. Springer, (2016)A Unified Framework for Enforcing Multiple Access Control Policies., , , и . SIGMOD Conference, стр. 474-485. ACM Press, (1997)Distributed Query Evaluation over Encrypted Data., , , , , и . DBSec, том 12840 из Lecture Notes in Computer Science, стр. 96-114. Springer, (2021)Kronos: A Scalable Group Re-Keying Approach for Secure Multicast., , , и . S&P, стр. 215-228. IEEE Computer Society, (2000)A Logical Language for Expressing Authorizations., , и . S&P, стр. 31-42. IEEE Computer Society, (1997)Transaction Processing in Multilevel-Secure Databases Using Replicated Architecture., и . S&P, стр. 360-368. IEEE Computer Society, (1990)A two snapshot algorithm for concurrency control in multi-level secure databases., , и . S&P, стр. 204-215. IEEE Computer Society, (1992)Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV)., , и . DBSec, том 12122 из Lecture Notes in Computer Science, стр. 3-23. Springer, (2020)