From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Non-Interactive Zero-Knowledge Proofs for Privacy Applications.. Brown University, USA, (2008)Amortizing Rate-1 OT and Applications to PIR and PSI., , , , и . TCC (3), том 13044 из Lecture Notes in Computer Science, стр. 126-156. Springer, (2021)Property Inference from Poisoning., , и . SP, стр. 1120-1137. IEEE, (2022)Combing for Credentials: Active Pattern Extraction from Smart Reply., , , , , и . SP, стр. 1443-1461. IEEE, (2024)Simplifying Design and Analysis of Complex Predicate Encryption Schemes., и . EUROCRYPT (1), том 10210 из Lecture Notes in Computer Science, стр. 627-656. (2017)Patient controlled encryption: ensuring privacy of electronic medical records., , , и . CCSW, стр. 103-114. ACM, (2009)SEEMless: Secure End-to-End Encrypted Messaging with less</> Trust., , , и . ACM Conference on Computer and Communications Security, стр. 1639-1656. ACM, (2019)ELEKTRA: Efficient Lightweight multi-dEvice Key TRAnsparency., , , , , и . CCS, стр. 2915-2929. ACM, (2023)An Anonymous Health Care System., и . HealthSec, USENIX Association, (2010)A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLIN., и . SCN, том 7485 из Lecture Notes in Computer Science, стр. 131-148. Springer, (2012)