From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Poster: arbitrators in the security infrastructure, supporting positive anonymity., , и . ACM Conference on Computer and Communications Security, стр. 753-756. ACM, (2011)Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs., , , и . ACM Conference on Computer and Communications Security, стр. 869-886. ACM, (2019)Efficient Pseudorandom Correlation Generators from Ring-LPN., , , , , и . CRYPTO (2), том 12171 из Lecture Notes in Computer Science, стр. 387-416. Springer, (2020)Lightweight Techniques for Private Heavy Hitters., , , , и . CoRR, (2020)Correlated Pseudorandom Functions from Variable-Density LPN., , , , , и . FOCS, стр. 1069-1080. IEEE, (2020)SSSDB: Database with Private Information Search., , , и . ALGOCLOUD, том 9511 из Lecture Notes in Computer Science, стр. 49-61. Springer, (2015)Anonymity Scheme for Interactive P2P Services., , , и . CCGRID, стр. 33-40. IEEE Computer Society, (2008)Correlated Pseudorandomness from Expand-Accumulate Codes., , , , , , и . CRYPTO (2), том 13508 из Lecture Notes in Computer Science, стр. 603-633. Springer, (2022)Topics in private information retrieval.. Technion - Israel Institute of Technology, Israel, (2001)Distributed flow detection over multi path sessions., , , и . SecureComm, стр. 3. ACM, (2008)