From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Distributed flow detection over multi path sessions., , , и . SecureComm, стр. 3. ACM, (2008)Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation., , и . EUROCRYPT (2), том 10211 из Lecture Notes in Computer Science, стр. 163-193. (2017)Schemes for Privately Computing Trust and Reputation., , и . IFIPTM, том 321 из IFIP Advances in Information and Communication Technology, стр. 1-16. Springer, (2010)Poster: arbitrators in the security infrastructure, supporting positive anonymity., , и . ACM Conference on Computer and Communications Security, стр. 753-756. ACM, (2011)Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs., , , и . ACM Conference on Computer and Communications Security, стр. 869-886. ACM, (2019)Correlated Pseudorandomness from Expand-Accumulate Codes., , , , , , и . CRYPTO (2), том 13508 из Lecture Notes in Computer Science, стр. 603-633. Springer, (2022)Topics in private information retrieval.. Technion - Israel Institute of Technology, Israel, (2001)Correlated Pseudorandom Functions from Variable-Density LPN., , , , , и . FOCS, стр. 1069-1080. IEEE, (2020)Lightweight Techniques for Private Heavy Hitters., , , , и . CoRR, (2020)Efficient Pseudorandom Correlation Generators from Ring-LPN., , , , , и . CRYPTO (2), том 12171 из Lecture Notes in Computer Science, стр. 387-416. Springer, (2020)