Author of the publication

An efficient spin-lock based multi-core resource sharing protocol.

, , , , and . IPCCC, page 1-7. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The distribution of quadratic residues and non-residues in the Goldwasser-Micali type of cryptosystem.. J. Math. Cryptol., 8 (2): 115-140 (2014)Forensic content detection through power consumption., , and . ICC, page 6759-6763. IEEE, (2012)A Privacy Preserving System for Cloud Computing., , and . CIT, page 648-653. IEEE Computer Society, (2011)Direct Anonymous Attestation: Enhancing Cloud Service User Privacy., , and . OTM Conferences (2), volume 7045 of Lecture Notes in Computer Science, page 577-587. Springer, (2011)The distribution of quadratic residues and non-residues in the Goldwasser-Micali type of cryptosystem. II.. J. Math. Cryptol., 9 (2): 115-137 (2015)Mutual Remote Attestation: Enabling System Cloning for TPM Based Platforms., , and . STM, volume 7170 of Lecture Notes in Computer Science, page 193-206. Springer, (2011)COVIDScholar: An automated COVID-19 research aggregation and analysis platform., , , , , , , , , and 1 other author(s). CoRR, (2020)Identifikation von Videoinhalten über granulare Stromverbrauchsdaten., , and . Sicherheit, volume P-195 of LNI, page 35-45. GI, (2012)Define privacy-preserving setbase drawer size standard: A ∊-closeness perspective., , , , , and . PST, page 362-365. IEEE Computer Society, (2013)