From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Enabling multi-layer cyber-security assessment of Industrial Control Systems through Hardware-In-The-Loop testbeds., , , , и . ASP-DAC, стр. 511-518. IEEE, (2016)Trust No One: Thwarting "heartbleed" Attacks Using Privacy-Preserving Computation., и . ISVLSI, стр. 59-64. IEEE Computer Society, (2014)$MP\ellC$: Privacy-Preserving IP Verification Using Logic Locking and Secure Multiparty Computation., , и . IOLTS, стр. 1-8. IEEE, (2023)Accelerated Encrypted Execution of General-Purpose Applications., , , , , и . IACR Cryptol. ePrint Arch., (2023)Juliet: A Configurable Processor for Computing on Encrypted Data., , и . IEEE Trans. Computers, 73 (9): 2335-2349 (сентября 2024)NFTs for 3D Models: Sustaining Ownership in Industry 4.0., и . IEEE Consumer Electron. Mag., 13 (5): 13-22 (сентября 2024)Tyche: Probabilistic Selection over Encrypted Data for Generative Language Models., и . IACR Cryptol. ePrint Arch., (2024)New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks., , и . IACR Cryptol. ePrint Arch., (2022)E3: A Framework for Compiling C++ Programs with Encrypted Operands., , , и . IACR Cryptology ePrint Archive, (2018)Obfuscated arbitrary computation using cryptographic primitives., и . IDT, стр. 5-8. IEEE, (2015)