From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Complexity and Performance of Secure Floating-Point Polynomial Evaluation Protocols.. ESORICS (2), том 12973 из Lecture Notes in Computer Science, стр. 352-369. Springer, (2021)Security threats identification and definition in early design phases of automotive IT services., , и . COMM, стр. 125-128. IEEE, (2020)Comparative Performance Evaluation of Key Exchange Protocols., и . COMM, стр. 1-6. IEEE, (2022)Multiparty Computation of Fixed-Point Multiplication and Reciprocal., и . DEXA Workshops, стр. 107-111. IEEE Computer Society, (2009)An Ensemble of Deep Convolutional Neural Networks for Drunkenness Detection Using Thermal Infrared Facial Imagery., , и . COMM, стр. 147-150. IEEE, (2020)Multi-Criteria server selection for over-the-top video streaming.. COMM, стр. 303-308. IEEE, (2016)Evaluation of Floating-Point Arithmetic Protocols Based on Shamir Secret Sharing.. ICETE (Selected Papers), том 1247 из Communications in Computer and Information Science, стр. 108-131. Springer, (2019)Efficient Secure Floating-point Arithmetic using Shamir Secret Sharing.. ICETE (2), стр. 49-60. SciTePress, (2019)Experimental Analysis of Key Exchange Protocols Using the JAKE Framework., и . COMM, стр. 1-6. IEEE, (2022)Secure Computation with Fixed-Point Numbers., и . Financial Cryptography, том 6052 из Lecture Notes in Computer Science, стр. 35-50. Springer, (2010)