Privacy-Preserving Proxy Re-encryption with Fine-Grained Access Control
Information Systems Security. ICISS 2017. Lecture Notes in Computer Science, vol 10717," Shyamasundar, R., Singh, V., Vaidya, J. (eds) Springer, Cham, 02 Dec. 2017. pp. 88–103 10.1007/978-3-319-72598-7_6
Anomaly Detection in Image Sequences Using Weakly Supervised Learning
10.1007/978-981-19-6004-8_36
A Single Electron Transistor-Based Floating Point Multiplier Realization at Room Temperature Operation
10.1007/978-981-19-6737-5_4
On Accountable and Distributed Audit of Outsourced Data
10.1007/978-981-19-7660-5_60
Distributed Connected Dominating Sets in Unit Square and Disk Graphs
10.1007/978-3-031-20350-3_28
Distributed Dominating Sets in Interval Graphs
10.1007/978-3-031-22105-7_45
Preface
10.1007/978-3-319-73606-8
Exact Algorithms and Hardness Results for Geometric Red-Blue Hitting Set Problem
10.1007/978-3-031-22105-7_45
Phase Frequency Detector Using CNTFET
10.1007/978-981-19-4364-5_62
Can we predict useful comments in source codes? - Analysis of findings from Information Retrieval in Software Engineering Track @ FIRE 2022
10.1145/3574318.3574329