Author of the publication

A SaaS Implementation of a New Generic Crypto-Classifier Service for Secure Energy Efficiency in Smart Cities.

, , , , , and . SMARTGREENS/VEHITS (Selected Papers), volume 992 of Communications in Computer and Information Science, page 90-115. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Stan, Oana
add a person with the name Stan, Oana
 

Other publications of authors with the same name

Introduction to Optimization Under Uncertainty Techniques for High-Performance Multicore Embedded Systems Compilation., and . Computational Intelligence in Digital and Network Designs and Applications, Springer, (2015)Secure Cross-Border Exchange of Health Related Data: The KONFIDO Approach., , , , , , , , , and 12 other author(s). EDCC, page 73-74. IEEE, (2019)The robust binomial approach to chance-constrained optimization problems with application to stochastic partitioning of large process networks., , , and . J. Heuristics, 20 (3): 261-290 (2014)A SaaS Implementation of a New Generic Crypto-Classifier Service for Secure Energy Efficiency in Smart Cities., , , , , and . SMARTGREENS/VEHITS (Selected Papers), volume 992 of Communications in Computer and Information Science, page 90-115. Springer, (2018)Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes., and . ISPEC, volume 11125 of Lecture Notes in Computer Science, page 265-281. Springer, (2018)A GRASP metaheuristic for the robust mapping and routing of dataflow process networks on manycore architectures., , , and . 4OR, 13 (3): 309-334 (2015)A New Crypto-Classifier Service for Energy Efficiency in Smart Cities., , , , , and . IACR Cryptology ePrint Archive, (2017)Dynamic Execution of Secure Queries over Homomorphic Encrypted Databases., , and . SCC@AsiaCCS, page 51-58. ACM, (2016)Secure Cross-Border Exchange of Health Related Data: The KONFIDO Approach., , , , , , , , , and 12 other author(s). IDCS, volume 11874 of Lecture Notes in Computer Science, page 318-327. Springer, (2019)An OpenNCP-based Solution for Secure eHealth Data Exchange., , , , , , , , , and 5 other author(s). J. Network and Computer Applications, (2018)