From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Tarzan: a peer-to-peer anonymizing network layer., и . ACM Conference on Computer and Communications Security, стр. 193-206. ACM, (2002)Privacy Engineering for Digital Rights Management Systems., , , и . Digital Rights Management Workshop, том 2320 из Lecture Notes in Computer Science, стр. 76-105. Springer, (2001)EnclaveDom: Privilege Separation for Large-TCB Applications in Trusted Execution Environments., , и . CoRR, (2019)Privacy and Integrity are Possible in the Untrusted Cloud., , , и . IEEE Data Eng. Bull., 35 (4): 73-82 (2012)Fairness and isolation in multi-tenant storage as optimization decomposition., , и . ACM SIGOPS Oper. Syst. Rev., 47 (1): 16-21 (2013)Increasing network resilience through edge diversity in NEBULA., , , , , , , и . ACM SIGMOBILE Mob. Comput. Commun. Rev., 16 (3): 14-20 (2012)PrismDB: Read-aware Log-structured Merge Trees for Heterogeneous Storage., , , и . CoRR, (2020)Scaling Virtual Worlds with a Physical Metaphor., , , , и . IEEE Pervasive Comput., 8 (3): 50-54 (2009)SANE: a protection architecture for enterprise networks, , , , , , и . Proceedings of the 15th conference on USENIX Security Symposium - Volume 15, Berkeley, CA, USA, (2006)The Free Haven Project: Reputation, , и . (2002)