Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bouncer: securing software by blocking bad input., , , , and . SOSP, page 117-130. ACM, (2007)COCOAEXPO: Confidential Containers via Attested Execution Policies., , , , , , , and . CoRR, (2023)End-to-end containment of internet worm epidemics.. University of Cambridge, UK, (2007)British Library, EThOS.PAC: Practical Accountability for CCF., , , , , , , , , and 2 other author(s). CoRR, (2021)Docovery: toward generic automatic document recovery., , , and . ASE, page 563-574. ACM, (2014)PIC: Practical Internet Coordinates for Distance Estimation., , , and . ICDCS, page 178-187. IEEE Computer Society, (2004)Securing Software by Enforcing Data-flow Integrity., , and . OSDI, page 147-160. USENIX Association, (2006)EnclaveDB: A Secure Database Using SGX., , and . IEEE Symposium on Security and Privacy, page 264-278. IEEE Computer Society, (2018)Vigilante: end-to-end containment of internet worms., , , , , , and . SOSP, page 133-147. ACM, (2005)Online data mining services for dynamic spatial databases II: air quality location based services and sonification, , , , , , , , , and . II International Conference and Exhibition on Geographic Information, (2005)