Search for persons
X
?
2022 6th International Conference on Information Technology (InCIT) ,
3
Seaport throughput forecasting by hybrid machine learning a..:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2021 ,
4
Beyond Software Watermarking: Traitor-Tracing for Pseudoran..:
, In:
?
Advances in Cryptology – ASIACRYPT 2020; Lecture Notes in Computer Science ,
5
Improving Speed and Security in Updatable Encryption Scheme:
, In:
?
Advances in Cryptology – ASIACRYPT 2020; Lecture Notes in Computer Science ,
6
Collusion Resistant Trace-and-Revoke for Arbitrary Identiti..:
, In:
?
Advances in Cryptology – EUROCRYPT 2020; Lecture Notes in Computer Science ,
7
Key-Homomorphic Pseudorandom Functions from LWE with Small ..:
, In:
?
Advances in Cryptology – CRYPTO 2019; Lecture Notes in Computer Science ,
8
Watermarking PRFs from Lattices: Stronger Security via Extr..:
, In:
?
Advances in Cryptology – CRYPTO 2019; Lecture Notes in Computer Science ,
9
Watermarking Public-Key Cryptographic Primitives:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – CRYPTO 2018 ,
10
Threshold Cryptosystems from Threshold Fully Homomorphic En..:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – CRYPTO 2018 ,
11
Multi-Theorem Preprocessing NIZKs from Lattices:
, In:
?
Lecture Notes in Computer Science; Security and Cryptography for Networks ,
12
Function-Hiding Inner Product Encryption Is Practical:
, In:
?
Proceedings of the 2019 2nd International Conference on E-Business, Information Management and Computer Science ,
13
Accounting Students' Perception on Skills and Attributes Re..:
, In:
?
Proceedings of the 6th Latin America Networking Conference ,
14
Hybrid RSS/TOA wireless positioning with a mobile anchor in..:
, In:
?
Proceedings of the 4th International Conference on Uniquitous Information Management and Communication ,
15