Personensuche
X
?
Proceedings of the 25th International Conference on Distributed Computing and Networking ,
1
Post Quantum Communication Over the Internet Infrastructure:
, In:
?
Data Analysis and Optimization; Springer Optimization and Its Applications ,
2
Purifying Data by Machine Learning with Certainty Levels:
, In:
?
Proceedings of the 5th workshop on Advanced tools, programming languages, and PLatforms for Implementing and Evaluating algorithms for Distributed systems ,
3
Invited Paper: Common Public Knowledge for Enhancing Machin..:
, In:
?
Cyber Security, Cryptology, and Machine Learning; Lecture Notes in Computer Science ,
4
Single Instance Self–masking via Permutations: (Preliminary..:
, In:
?
Proceedings of the 16th ACM International Conference on Systems and Storage ,
5
Analyzing large-scale genomic data with cloud data lakes:
, In:
?
Cyber Security, Cryptology, and Machine Learning; Lecture Notes in Computer Science ,
6
HBSS: (Simple) Hash-Based Stateless Signatures – Hash All t..:
, In:
?
Cyber Security, Cryptology, and Machine Learning; Lecture Notes in Computer Science ,
7
BFLUT Bloom Filter for Private Look Up Tables:
, In:
?
2022 IEEE 21st International Symposium on Network Computing and Applications (NCA) ,
8
Swarming with (Visual) Secret (Shared) Mission:
, In:
?
Lecture Notes in Computer Science; Stabilization, Safety, and Security of Distributed Systems ,
9
Brief Announcement: Self Masking for Hardening Inversions:
, In:
?
Cyber Security, Cryptology, and Machine Learning; Lecture Notes in Computer Science ,
10
Non-stopping Junctions via Traffic Scheduling:
, In:
?
2022 IEEE 21st International Symposium on Network Computing and Applications (NCA) ,
11
Distributed Coordination Based on Quantum Entanglement (Wor..:
, In:
?
Cyber Security, Cryptology, and Machine Learning; Lecture Notes in Computer Science ,
12
Randomness for Randomness Testing:
, In:
?
2022 IEEE 21st International Symposium on Network Computing and Applications (NCA) ,
13
Multiplicative Partially Homomorphic CRT Secret Sharing : (..:
, In:
?
Lecture Notes in Computer Science; Cyber Security Cryptography and Machine Learning ,
14
Polynomial Time k-Shortest Multi-criteria Prioritized and A..:
, In:
?
Proceedings of the 14th ACM International Conference on Systems and Storage ,
15