Search for persons
X
?
2023 IEEE International Parallel and Distributed Processing Symposium (IPDPS) ,
1
Towards Faster Fully Homomorphic Encryption Implementation ..:
, In:
?
Proceedings of the 52nd International Conference on Parallel Processing ,
2
AsyncGBP: Unleashing the Potential of HeterogeneousComputin..:
, In:
?
Computer Security – ESORICS 2022; Lecture Notes in Computer Science ,
3
A Novel High-Performance Implementation of CRYSTALS-Kyber w..:
, In:
?
2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
4
Booting IoT Terminal Device Securely with eMMC:
, In:
?
Annual Computer Security Applications Conference ,
5
Heterogeneous-PAKE: Bridging the Gap between PAKE Protocols..:
, In:
?
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security ,
6
Cache-in-the-Middle (CITM) Attacks: Manipulating Sensitive ..:
, In:
?
2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
7
SecureESFS: Sharing Android External Storage Files in a Sec..:
, In:
?
Lecture Notes in Computer Science; Information Security ,
8
Evaluation on the Security of Commercial Cloud Container Se..:
, In:
?
2020 IEEE Symposium on Computers and Communications (ISCC) ,
9
PIV4DB: Probabilistic Integrity Verification for Cloud Data..:
, In:
?
Proceedings of the 18th Conference on Embedded Networked Sensor Systems ,
10
TrustICT : an efficient trusted interaction interface be..:
, In:
?
2020 International Joint Conference on Neural Networks (IJCNN) ,
11
User Alignment with Jumping Seed Alignment Information Prop..:
, In:
?
Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2018 ,
12
How to Block the Malicious Access to Android External Stora..:
, In:
?
Communications in Computer and Information Science; Neural Information Processing ,
13
Anchor User Oriented Accordant Embedding for User Identity ..:
, In:
?
Neural Information Processing; Lecture Notes in Computer Science ,
14
Aligning Users Across Social Networks by Joint User and Lab..:
, In:
?
Lecture Notes in Computer Science; Computer Security – ESORICS 2019 ,
15