Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical implementations of program obfuscators for point functions., , , , , and . HPCS, page 460-467. IEEE, (2016)Securely Sharing Encrypted Medical Information., , , and . CHASE, page 330-331. IEEE Computer Society, (2016)An FPGA co-processor implementation of Homomorphic Encryption., , , and . HPEC, page 1-6. IEEE, (2014)A Survey of Security Concepts for Common Operating Environments., , , and . ISORC Workshops, page 244-253. IEEE Computer Society, (2011)Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme., , , , and . IACR Cryptology ePrint Archive, (2018)Approximating the Minimal Sensor Selection for Supervisory Control., , and . Discrete Event Dynamic Systems, 16 (1): 143-170 (2006)An update on SIPHER (Scalable Implementation of Primitives for Homomorphic EncRyption) - FPGA implementation using Simulink., , , and . HPEC, page 1-5. IEEE, (2012)An Ontology for Resource Sharing., and . ICSC, page 530-537. IEEE Computer Society, (2011)Privacy-Preserving Data Exfiltration Monitoring Using Homomorphic Encryption.. CSCloud, page 48-53. IEEE Computer Society, (2015)Secure Proxy-Reencryption-Based Inter-Network Key Exchange., , and . MILCOM, page 780-785. IEEE, (2018)