Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Parallelizing the CryptMT Stream Cipher., , , and . VTC Spring, page 1082-1086. IEEE, (2008)A hardware framework for the fast generation of multiple long-period random number streams., and . FPGA, page 245-254. ACM, (2008)MSWasm: Soundly Enforcing Memory-Safe Execution of Unsafe Code., , , , , , , , , and . CoRR, (2022)STORM: Refinement Types for Secure Web Applications., , , , , , , and . OSDI, page 441-459. USENIX Association, (2021)WaVe: a verifiably secure WebAssembly sandboxing runtime., , , , , , , and . SP, page 2940-2955. IEEE, (2023)Constant-time foundations for the new spectre era., , , , , , and . PLDI, page 913-926. ACM, (2020)User-Assisted Host-Based Detection of Outbound Malware Traffic., , , , and . ICICS, volume 5927 of Lecture Notes in Computer Science, page 293-307. Springer, (2009)Information-Flow Control for Programming on Encrypted Data., , , and . CSF, page 45-60. IEEE Computer Society, (2012)Finding and Preventing Bugs in JavaScript Bindings., , , , , and . IEEE Symposium on Security and Privacy, page 559-578. IEEE Computer Society, (2017)Retrofitting Fine Grain Isolation in the Firefox Renderer (Extended Version)., , , , , , , and . CoRR, (2020)