Author of the publication

MinimaLT: minimal-latency networking through better security.

, , , , and . ACM Conference on Computer and Communications Security, page 425-438. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Increasing Network Bandwidth on Meshes., and . SPAA, page 336-345. ACM, (1994)Epochs.. ACM Trans. Program. Lang. Syst., 14 (1): 28-53 (1992)The Microflow Architecture.. ICPP (1), page 113-117. Pennsylvania State University Press, (1988)Expanded rectangles: a new VLSI data structure., and . ICCAD, page 538-541. IEEE Computer Society, (1988)MinimaLT: minimal-latency networking through better security., , , , and . ACM Conference on Computer and Communications Security, page 425-438. ACM, (2013)The Complexity of Discretionary Access Control., , and . IWSEC, volume 4266 of Lecture Notes in Computer Science, page 405-420. Springer, (2006)On the Feasability of Dynamic Partitioning of Pointer Structures.. LCPC, volume 757 of Lecture Notes in Computer Science, page 82-96. Springer, (1992)Instant Revocation.. EuroPKI, volume 5057 of Lecture Notes in Computer Science, page 31-48. Springer, (2008)What can you say and what does it mean?. CollaborateCom, IEEE Computer Society / ICST, (2006)Quarantining Untrusted Entities: Dynamic Sandboxing Using LEAP., and . ACSAC, page 211-220. IEEE Computer Society, (2007)