From post

AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing.

, , , , и . DPM/SETOP, том 7731 из Lecture Notes in Computer Science, стр. 201-216. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Cimato, Stelvio
add a person with the name Cimato, Stelvio
 

Другие публикации лиц с тем же именем

Online Advertising: Secure E-coupons., и . ICTCS, том 2202 из Lecture Notes in Computer Science, стр. 370-383. Springer, (2001)Anonymous Group Communication in Mobile Networks., , и . ICTCS, том 2841 из Lecture Notes in Computer Science, стр. 316-328. Springer, (2003)Visual Cryptography Based Watermarking: Definition and Meaning., , и . IWDW, том 7809 из Lecture Notes in Computer Science, стр. 435-448. Springer, (2012)A Formal Approach to the Specification of Java Components., и . ECOOP Workshops, том 1743 из Lecture Notes in Computer Science, стр. 107-108. Springer, (1999)Animating a Non-executable Formal Specification with a Distributed Symbolic Language., и . DISCO, том 1128 из Lecture Notes in Computer Science, стр. 200-201. Springer, (1996)Efficient Key Management for Enforcing Access Control in Outsourced Scenarios., , , , , , и . SEC, том 297 из IFIP Advances in Information and Communication Technology, стр. 364-375. Springer, (2009)A Lightweight Protocol for Dynamic RFID Identification.. COMPSAC, стр. 673-678. IEEE Computer Society, (2008)Privacy Preserving Risk Assessment of Credit Securities., , и . SITIS, стр. 506-513. IEEE Computer Society, (2009)Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything., и . From Database to Cyber Security, том 11170 из Lecture Notes in Computer Science, стр. 113-124. Springer, (2018)Efficient Implementation of a Proxy-based Protocol for Data Sharing on the Cloud., , и . SCC@AsiaCCS, стр. 67-74. ACM, (2017)