Author of the publication

Lemonade from Lemons: Harnessing Device Wearout to Create Limited-Use Security Architectures.

, , , and . ISCA, page 361-374. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verifiable differential privacy., , , and . EuroSys, page 28:1-28:14. ACM, (2015)Using Differential Privacy to Efficiently Mitigate Side Channels in Distributed Analytics., , , and . EuroSec@EuroSys, page 4:1-4:6. ACM, (2018)Lemonade from Lemons: Harnessing Device Wearout to Create Limited-Use Security Architectures., , , and . ISCA, page 361-374. ACM, (2017)Privacy and Integrity in the Untrusted Cloud. Princeton University, USA, (2012)Lest We Remember: Cold Boot Attacks on Encryption Keys., , , , , , , , and . USENIX Security Symposium, page 45-60. USENIX Association, (2008)SPORC: Group Collaboration using Untrusted Cloud Resources., , , and . OSDI, page 337-350. USENIX Association, (2010)Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider., , , and . USENIX Security Symposium, page 647-662. USENIX Association, (2012)Information-Theoretic Tools to Understand Distributed Source Coding in Neuroscience., , , and . IEEE J. Sel. Areas Inf. Theory, (2024)Security Analysis of the Diebold AccuVote-TS Voting Machine., , and . EVT, USENIX Association, (2007)On Subliminal Channels in Encrypt-on-Cast Voting Systems., and . EVT/WOTE, USENIX Association, (2009)