Author of the publication

Secure Execution of Computations in Untrusted Hosts.

, , , and . Ada-Europe, volume 4006 of Lecture Notes in Computer Science, page 106-118. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Surrogate Neural Networks to Estimate Parametric Sensitivity of Ocean Models., , , , , , , and . CoRR, (2023)Sparse Jacobian Computation Using ADIC2 and ColPack., , , , and . ICCS, volume 4 of Procedia Computer Science, page 2115-2123. Elsevier, (2011)Verifying Properties of Differentiable Programs., , , , and . SAS, volume 11002 of Lecture Notes in Computer Science, page 205-222. Springer, (2018)Compiler directed network-on-chip reliability enhancement for chip multiprocessors., , , and . LCTES, page 85-94. ACM, (2010)Checkpointing Approaches for the Computation of Adjoints Covering Resilience Issues., , and . CSC, page 22-31. SIAM, (2020)Scalable Automatic Differentiation of Multiple Parallel Paradigms through Compiler Augmentation., , , , , , , and . SC, page 60:1-60:18. IEEE, (2022)Compiler-Directed Power Density Reduction in NoC-Based Multi-Core Designs., , and . ISQED, page 570-575. IEEE Computer Society, (2006)Securing Disk-Resident Data through Application Level Encryption., , , , and . IEEE Security in Storage Workshop, page 46-57. IEEE Computer Society, (2007)In-Network Caching for Chip Multiprocessors., , , , and . HiPEAC, volume 5409 of Lecture Notes in Computer Science, page 373-388. Springer, (2009)A Mixed Approach to Adjoint Computation with Algorithmic Differentiation., , and . System Modelling and Optimization, volume 494 of IFIP Advances in Information and Communication Technology, page 331-340. (2015)