From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Falcon Codes: Fast, Authenticated LT Codes., , , и . IACR Cryptology ePrint Archive, (2014)Privacy-preserving data-oblivious geometric algorithms for geographic data., , и . GIS, стр. 13-22. ACM, (2010)Reinventing the wheel: an optimal data structure for connectivity queries., , , и . STOC, стр. 194-200. ACM, (1993)Dynamic Graph Drawings: Trees, Series-Parallel Digraphs, and Planar ST-Digraphs., , , и . SIAM J. Comput., 24 (5): 970-1001 (1995)Combine and Conquer: a General Technique for Dynamic Algorithms (Extended Abstract)., и . ESA, том 726 из Lecture Notes in Computer Science, стр. 97-108. Springer, (1993)Optimal Shortest Path and Minimum-Link Path Queries in the Presence of Obstacles (Extended Abstract)., и . ESA, том 855 из Lecture Notes in Computer Science, стр. 266-277. Springer, (1994)Authenticated Data Structures for Graph and Geometric Searching., , , и . CT-RSA, том 2612 из Lecture Notes in Computer Science, стр. 295-313. Springer, (2003)The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution., , и . IACR Cryptology ePrint Archive, (2019)Algorithm animation over the World Wide Web., , , и . AVI, стр. 203-212. ACM Press, (1996)Efficient integrity checking of untrusted network storage., , , и . StorageSS, стр. 43-54. ACM, (2008)