Personensuche
X
?
2024 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML) ,
1
EdgePruner: Poisoned Edge Pruning in Graph Contrastive Lear..:
, In:
?
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy ,
2
AutoRed: Automating Red Team Assessment via Strategic Think..:
, In:
?
Information Security and Cryptology; Lecture Notes in Computer Science ,
3
Compact Ring Signatures with Post-Quantum Security in Stand..:
, In:
?
Information Security and Cryptology; Lecture Notes in Computer Science ,
4
Compact Accountable Ring Signatures in the Plain Model:
, In:
?
Computer Security – ESORICS 2023; Lecture Notes in Computer Science ,
6
An Ultra-High Throughput AES-Based Authenticated Encryption..:
, In:
?
Security, Privacy, and Applied Cryptography Engineering; Lecture Notes in Computer Science ,
9
Logarithmic-Size (Linkable) Ring Signatures from Lattice Is..:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
10
Spherical Gaussian Leftover Hash Lemma via the Rényi Diverg..:
, In:
?
Information Security and Privacy; Lecture Notes in Computer Science ,
14
Homomorphic Signatures for Subset and Superset Mixed Predic..:
, In:
?
Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2022 ,
15