Author of the publication

Preventing Cryptographic Key Leakage in Cloud Virtual Machines.

, , , and . USENIX Security Symposium, page 703-718. USENIX Association, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preventing Cryptographic Key Leakage in Cloud Virtual Machines., , , and . USENIX Security Symposium, page 703-718. USENIX Association, (2014)Vigiles: Fine-Grained Access Control for MapReduce Systems., , , and . BigData Congress, page 40-47. IEEE Computer Society, (2014)Privacy-aware dynamic feature selection., , , and . ICDE, page 78-88. IEEE Computer Society, (2015)CheapSMC: A Framework to Minimize Secure Multiparty Computation Cost in the Cloud., , , and . DBSec, volume 9766 of Lecture Notes in Computer Science, page 285-294. Springer, (2016)Analysis of heuristic based access pattern obfuscation., , , , and . CollaborateCom, page 537-544. ICST / IEEE, (2013)TrustMR: Computation integrity assurance system for MapReduce., , and . IEEE BigData, page 441-450. IEEE Computer Society, (2015)CheapSMC: A Framework to Minimize SMC Cost in Cloud., , , and . CoRR, (2016)Single-Setup Privacy Enforcement for Heterogeneous Data Ecosystems., , , , and . CIKM, page 1943-1946. ACM, (2018)AccountableMR: Toward accountable MapReduce systems., , , and . IEEE BigData, page 451-460. IEEE Computer Society, (2015)BigGate: Access Control Framework for Outsourced Key-Value Stores., , and . CODASPY, page 171-182. ACM, (2015)