Author of the publication

Secure cryptographic functions via virtualization-based outsourced computing.

, , , and . Concurr. Comput. Pract. Exp., 28 (11): 3149-3163 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Tool to Detect Performance Problems of Multi-threaded Programs on NUMA Systems., , and . Trustcom/BigDataSE/ISPA, page 1145-1152. IEEE, (2016)PerfDoc: Automatic Performance Bug Diagnosis in Production Cloud Computing Infrastructures., , , and . Trustcom/BigDataSE/ISPA, page 683-690. IEEE, (2016)Grid workflow scheduling based on reliability cost., , and . Infoscale, volume 304 of ACM International Conference Proceeding Series, page 12. ACM, (2007)FDKeeper: A Quick and Open Failure Detector for Cloud Computing System., , , and . C3S2E, page 14:1-14:8. ACM, (2014)Fine-grained CUDA-based Parallel Intra Prediction for H.264/AVC., , , and . NOSSDAV, page 97. ACM, (2014)Grid information service based on network latency., , , and . Infoscale, volume 152 of ACM International Conference Proceeding Series, page 9. ACM, (2006)ALTER: first step towards dependable grids., , and . SAC, page 805-806. ACM, (2006)CBL: exploiting community based locality for efficient content search in online social networks., , and . HPDC, page 299-304. ACM, (2014)Hierarchical Attention Based Recurrent Neural Network Framework for Mobile MOBA Game Recommender Systems., , and . ISPA/IUCC/BDCloud/SocialCom/SustainCom, page 338-345. IEEE, (2018)Se-Lambda: Securing Privacy-Sensitive Serverless Applications Using SGX Enclave., , and . SecureComm (1), volume 254 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 451-470. Springer, (2018)