Author of the publication

Meeting the Challenges of Critical and Extreme Dependability and Security.

, , , , and . PRDC, page 92-97. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RepuCoin: Your Reputation Is Your Power., , , and . IEEE Trans. Computers, 68 (8): 1225-1237 (2019)DAMYSUS: streamlined BFT consensus leveraging trusted components., , , and . EuroSys, page 1-16. ACM, (2022)Cloud-Assisted Read Alignment and Privacy., , , and . PACBB, volume 616 of Advances in Intelligent Systems and Computing, page 220-227. Springer, (2017)AGIC: Approximate Gradient Inversion Attack on Federated Learning., , , , and . SRDS, page 12-22. IEEE, (2022)Leveraging the Verifier's Dilemma to Double Spend in Bitcoin., , and . FC, volume 13951 of Lecture Notes in Computer Science, page 149-165. Springer, (2023)MaskAl: Privacy Preserving Masked Reads Alignment using Intel SGX., , , and . SRDS, page 113-122. IEEE Computer Society, (2018)TabVFL: Improving Latent Representation in Vertical Federated Learning., , , and . CoRR, (2024)Intrusion Resilience Systems for Modern Vehicles., , , and . VTC2023-Spring, page 1-7. IEEE, (2023)Secure and distributed assessment of privacy-preserving GWAS releases., , and . Middleware, page 308-321. ACM, (2022)Unstoppable DAOs for web3 disruption., , and . DICG@Middleware, page 37-42. ACM, (2022)