Personensuche
X
?
Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security ,
7
Low-Cost Hiding of the Query Pattern:
, In:
?
Computational Intelligence Methods for Bioinformatics and Biostatistics; Lecture Notes in Computer Science ,
9
Committee-Based Active Learning to Select Negative Examples..:
, In:
?
2020 IEEE European Symposium on Security and Privacy (EuroS&P) ,
10
Differentially Private Two-Party Set Operations:
, In:
?
Proceedings of the 2019 9th International Conference on Biomedical Engineering and Technology ,
11
Analysis of Novel Annotations in the Gene Ontology for Boos..:
, In:
?
Proceedings of the 13th International Conference on Availability, Reliability and Security ,
12
An Efficient Cryptography-Based Access Control Using Inner-..:
, In:
?
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing ,
13
Efficient Implementation of a Proxy-based Protocol for Data..:
, In:
?
2015 IEEE Trustcom/BigDataSE/ISPA ,
15