Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preventing EFail Attacks with Client-Side WebAssembly: The Case of Swiss Post's IncaMail., , , , , , and . DEBS, page 151-156. ACM, (2023)An Exploratory Study of Attestation Mechanisms for Trusted Execution Environments., , , , and . CoRR, (2022)A Comprehensive Trusted Runtime for WebAssembly with Intel SGX., , , , , , and . CoRR, (2023)VEDLIoT: Very Efficient Deep Learning in IoT., , , , , , , , , and 26 other author(s). CoRR, (2022)Montsalvat: Intel SGX shielding for GraalVM native images., , , , , , , and . Middleware, page 352-364. ACM, (2021)WaTZ: A Trusted WebAssembly Runtime Environment with Remote Attestation for TrustZone., , , and . ICDCS, page 1177-1189. IEEE, (2022)Montsalvat: Intel SGX Shielding for GraalVM Native Images., , , , , , , and . CoRR, (2023)Fortress: Securing IoT Peripherals with Trusted Execution Environments., , , , and . CoRR, (2023)VEDLIoT: Very Efficient Deep Learning in IoT., , , , , , , , , and 26 other author(s). DATE, page 963-968. IEEE, (2022)A Holistic Approach for Trustworthy Distributed Systems with WebAssembly and TEEs., , , , , , and . OPODIS, volume 286 of LIPIcs, page 23:1-23:23. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2023)