Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inter-domain Communication Protocol for Real-time File Access Monitor of Virtual Machine., , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 3 (1/2): 120-137 (2012)Web Browser Tampering: Inspecting CPU Features from Side-Channel Information., , , and . BWCCA, volume 12 of Lecture Notes on Data Engineering and Communications Technologies, page 392-403. Springer, (2017)RDMA-Based Direct Transfer of File Data to Remote Page Cache., , , and . CLUSTER, page 214-225. IEEE Computer Society, (2015)Estimating CPU Features by Browser Fingerprinting., , , , , , and . IMIS, page 587-592. IEEE Computer Society, (2016)RDMA-Based Cooperative Caching for a Distributed File System., , , , and . ICPADS, page 344-353. IEEE Computer Society, (2015)Tor Fingerprinting: Tor Browser Can Mitigate Browser Fingerprinting?, , , , , and . NBiS, volume 7 of Lecture Notes on Data Engineering and Communications Technologies, page 504-517. Springer, (2017)Proposal and Implementation of a Countermeasure Against Event Tracking on the Web., , , , , , , and . IMIS, volume 612 of Advances in Intelligent Systems and Computing, page 435-444. Springer, (2017)Checkpointing an Operating System Using a Parapass-through Hypervisor., , and . J. Inf. Process., 23 (2): 132-141 (2015)OS and Application Identification by Installed Fonts., , , , , , , and . AINA, page 684-689. IEEE Computer Society, (2016)