Author
Showing results 1 to 29 of 29
Issue Date | Title / Author(s) / Citation | File | Altmetrics |
---|---|---|---|
2014-05 | Lecture Notes in Computer Science, Vol.8282, pp.121-135 | DOI | |
2015-04 | Lecture Notes in Computer Science, Vol.9056, pp.3-12 | DOI | |
2016-01 | LMS Journal of Computation and Mathematics, Vol.19 No.1, pp.1-15 | DOI | |
2016-11 | IFAC-PapersOnLine, Vol.49 No.22, pp.175-180 | DOI | |
2017-04 | Lecture Notes in Computer Science, Vol.10323, pp.53-74 | DOI | |
2017-07 | BMC Medical Genomics, Vol.10, p. 42 | DOI | |
2017-07 | BMC Medical Genomics, 10(Suppl 2):42 | view fileDOI | |
2017-12 | Lecture Notes in Computer Science, Vol.10624, pp.409-437 | DOI | |
2018-03 | IEEE Access, Vol.6, pp.24325-24339 | DOI | |
2018-05 | Lecture Notes in Computer Science, Vol.10820, pp.360-384 | DOI | |
2018-07 | Lecture Notes in Computer Science, Vol.10946, pp.28-44 | DOI | |
2018-08 | IEEE Access, Vol.6, pp.46938-46948 | DOI | |
2018-08 | Lecture Notes in Computer Science, Vol.10993, pp.184-210 | DOI | |
2018-09 | Lecture Notes in Computer Science, Vol.11035, pp.160-177 | DOI | |
2018-10 | BMC Medical Genomics, Vol.11, p. 83 | DOI | |
2018-10 | BMC Medical Genomics, 11(Suppl 4):83 | view fileDOI | |
2019-01 | Lecture Notes in Computer Science, Vol.11349, pp.347-368 | DOI | |
2019-04 | BMC Genomics, 20(Suppl 2):188 | view fileDOI | |
2020-08 | Lecture Notes in Computer Science, Vol.11959, pp.227-249 | DOI | |
2020-12 | Lecture Notes in Computer Science, Vol.11975, pp.225-241 | DOI | |
2021-01 | Journal of Mathematical Cryptology, Vol.15 No.1, pp.1-3 | DOI | |
2021-01 | Lecture Notes in Computer Science, Vol.13083, pp.653-672 | DOI | |
2021-11 | Cell Systems, Vol.12 No.11, pp.1108-1120 | DOI | |
2021-11 | Lecture Notes in Computer Science, Vol.13083, pp.653-672 | DOI | |
2022 | Protecting Privacy through Homomorphic Encryption, p. C1 | DOI | |
2022-07 | Springer Monographs in Mathematics, pp.3-28 | DOI | |
2022-07 | IEEE Transactions on Information Forensics and Security, Vol.17, pp.2553-2568 | DOI | |
2022-08 | Designs, Codes, and Cryptography, Vol.90 No.8, pp.1735-1760 | DOI | |
2022-10 | International Journal of Information Security, Vol.21 No.5, pp.953-971 | DOI |