Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PubSub-SGX: Exploiting Trusted Execution Environments for Privacy-Preserving Publish/Subscribe Systems., , , , , , , , , and 2 other author(s). CoRR, (2019)Secure end-to-end processing of smart metering data., , , , , , , , , and 6 other author(s). J. Cloud Comput., (2019)The Velox Transactional Memory Stack., , , , , , , , , and 14 other author(s). IEEE Micro, 30 (5): 76-87 (2010)Automatic Detection and Masking of Nonatomic Exception Handling., , and . IEEE Trans. Software Eng., 30 (8): 547-560 (2004)Capacity planning for dependable services., , , , , and . Theor. Comput. Sci., (October 2023)Improving Program Correctness with Atomic Exception Handling., and . J. Univers. Comput. Sci., 13 (8): 1047-1072 (2007)Topic 8 Distributed Systems and Algorithms., , , and . Euro-Par, volume 4641 of Lecture Notes in Computer Science, page 549. Springer, (2007)Fault-tolerant and scalable TCP splice and web server architecture., , and . SRDS, page 301-310. IEEE Computer Society, (2006)ControlFreak: Signature Chaining to Counter Control Flow Attacks., and . SRDS, page 84-93. IEEE Computer Society, (2015)SpecFuzz: Bringing Spectre-type vulnerabilities to the surface., , , and . USENIX Security Symposium, page 1481-1498. USENIX Association, (2020)