Author of the publication

Study on the Technology of the Secure Computation in the Different Adversarial Models.

, , , and . CSISE (1), volume 104 of Advances in Intelligent and Soft Computing, page 473-478. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Corpus Linguistics for Establishing The Natural Language Content of Digital Library Documents., , and . DL, volume 916 of Lecture Notes in Computer Science, page 165-180. Springer, (1994)System Support for Automated Profiling and Optimization., , , , and . SOSP, page 15-26. ACM, (1997)Operating System Review 31(5).XenSocket: A High-Throughput Interdomain Transport for Virtual Machines., , , and . Middleware, volume 4834 of Lecture Notes in Computer Science, page 184-203. Springer, (2007)Virtual Machine Images as Structured Data: The Mirage Image Library., , and . HotCloud, USENIX Association, (2011)Trustworthy and personalized computing on public kiosks., , , , , and . MobiSys, page 199-210. ACM, (2008)Automated Security Debugging Using Program Structural Constraints., , , and . ACSAC, page 453-462. IEEE Computer Society, (2007)Design and Implementation of a TCG-based Integrity Measurement Architecture., , , and . USENIX Security Symposium, page 223-238. USENIX, (2004)Screening and identification of the core genes and drug targets in COVID-19 and coronary artery disease by integrated bioinformatics., , , , , , , and . BIC, ACM, (2024)SEER: practical memory virus scanning as a service., , , , and . ACSAC, page 186-195. ACM, (2014)A Generic Implementation Framework for Measuring Ontology-Based Information., , , and . Int. J. Comput. Intell. Syst., 7 (1): 136-146 (2014)