From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication., , , , , , и . ACSAC, стр. 799-813. ACM, (2023)PIDGIN: privacy-preserving interest and content sharing in opportunistic networks., , , и . AsiaCCS, стр. 135-146. ACM, (2014)Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database., , , и . WISTP, том 10741 из Lecture Notes in Computer Science, стр. 41-55. Springer, (2017)Obfuscating Evasive Decision Trees., , и . INDOCRYPT (2), том 14460 из Lecture Notes in Computer Science, стр. 84-104. Springer, (2023)An Architectural Approach for Self-Managing Security Services., и . AINA Workshops, стр. 153-158. IEEE Computer Society, (2009)Privacy-Preserving Content Delivery Networks., , и . LCN, стр. 607-610. IEEE Computer Society, (2017)Using Aspect-GAMMA in the design of embedded systems., , , , , , , , и . HLDVT, стр. 69-74. IEEE Computer Society, (2002)A Large-Scale Study of Device and Link Presentation in Email Phishing Susceptibility., , , , , , и . OZCHI, стр. 78-85. ACM, (2023)Eyes on the Phish(er): Towards Understanding Users' Email Processing Pattern and Mental Models in Phishing Detection., , , , и . CoRR, (2024)Towards Blockchain-Based Scalable and Trustworthy File Sharing., , и . ICCCN, стр. 1-2. IEEE, (2018)