From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Don't Talk to Strangers - On the Challenges of Intelligent Vehicle Authentication., и . VEHITS, стр. 522-528. SciTePress, (2018)A Protocol for Privately Reporting Ad Impressions at Scale., , и . ACM Conference on Computer and Communications Security, стр. 1591-1601. ACM, (2016)Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers., , и . NDSS, The Internet Society, (2019)Charm: A Framework for Rapidly Prototyping Cryptosystems., , и . NDSS, The Internet Society, (2012)Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage., , , , и . USENIX Security Symposium, стр. 655-672. USENIX Association, (2016)Blogging birds: Generating narratives about reintroduced species to promote public engagement., , , , и . INLG, стр. 120-124. The Association for Computer Linguistics, (2012)Fluid MPC: Secure Multiparty Computation with Dynamic Participants., , , , и . CRYPTO (2), том 12826 из Lecture Notes in Computer Science, стр. 94-123. Springer, (2021)Downgrade Resilience in Key-Exchange Protocols., , , , , и . IEEE Symposium on Security and Privacy, стр. 506-525. IEEE Computer Society, (2016)Meteor: Cryptographically Secure Steganography for Realistic Distributions., , , и . CCS, стр. 1529-1548. ACM, (2021)Fuzzy Message Detection., , , и . CCS, стр. 1507-1528. ACM, (2021)