Author of the publication

MinimaLT: minimal-latency networking through better security.

, , , , and . ACM Conference on Computer and Communications Security, page 425-438. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MinimaLT: minimal-latency networking through better security., , , , and . ACM Conference on Computer and Communications Security, page 425-438. ACM, (2013)On the Generality and Convenience of Etypes., and . IEEE Symposium on Security and Privacy Workshops, page 117-124. IEEE Computer Society, (2015)Ethos' Deeply Integrated Distributed Types., , , and . IEEE Symposium on Security and Privacy Workshops, page 167-180. IEEE Computer Society, (2014)PivotWall: SDN-Based Information Flow Control., , , and . SOSR, page 3:1-3:14. ACM, (2018)Studying Naive Users and the Insider Threat with SimpleFlow., , and . MIST@CCS, page 35-46. ACM, (2016)The Industrial Age of Hacking., , , , , , and . USENIX Security Symposium, page 1129-1146. USENIX Association, (2020)Digital identity security architecture in Ethos., and . Digital Identity Management, page 23-30. ACM, (2011)Improving Application Security through TLS-Library Redesign., and . SPACE, volume 9354 of Lecture Notes in Computer Science, page 75-94. Springer, (2015)Using VisorFlow to Control Information Flow without Modifying the Operating System Kernel or its Userspace., , , , and . MIST@CCS, page 13-24. ACM, (2017)Courses as Code: The Aquinas Learning System.. CSET @ USENIX Security Symposium, page 30-38. ACM, (2022)