Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AntFarm: Efficient Content Distribution with Managed Swarms., and . NSDI, page 107-122. USENIX Association, (2009)Device Driver Safety Through a Reference Validation Mechanism., , , , and . OSDI, page 241-254. USENIX Association, (2008)Enabling Strong Database Integrity using Trusted Execution Environments., , and . CoRR, (2018)Short Paper: Service-Oriented Sharding for Blockchains., , and . Financial Cryptography, volume 10322 of Lecture Notes in Computer Science, page 393-401. Springer, (2017)Peer-to-Peer Authentication with a Distributed Single Sign-On Service., , and . IPTPS, volume 3279 of Lecture Notes in Computer Science, page 250-258. Springer, (2004)SoK: A Classification Framework for Stablecoin Designs., , and . Financial Cryptography, volume 12059 of Lecture Notes in Computer Science, page 174-197. Springer, (2020)Efficient Verifiable Secret Sharing with Share Recovery in BFT Protocols., , , , , and . ACM Conference on Computer and Communications Security, page 2387-2402. ACM, (2019)A content propagation metric for efficient content distribution., , and . SIGCOMM, page 326-337. ACM, (2011)Bitcoin Covenants., , and . Financial Cryptography Workshops, volume 9604 of Lecture Notes in Computer Science, page 126-141. Springer, (2016)Logical attestation: an authorization architecture for trustworthy computing., , , , , , and . SOSP, page 249-264. ACM, (2011)