Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PubSub-SGX: Exploiting Trusted Execution Environments for Privacy-Preserving Publish/Subscribe Systems., , , , , , , , , and 2 other author(s). CoRR, (2019)Topic 8 Distributed Systems and Algorithms., , , and . Euro-Par, volume 4641 of Lecture Notes in Computer Science, page 549. Springer, (2007)Automatic Detection and Masking of Nonatomic Exception Handling., , and . IEEE Trans. Software Eng., 30 (8): 547-560 (2004)The Velox Transactional Memory Stack., , , , , , , , , and 14 other author(s). IEEE Micro, 30 (5): 76-87 (2010)Improving Program Correctness with Atomic Exception Handling., and . J. Univers. Comput. Sci., 13 (8): 1047-1072 (2007)Secure end-to-end processing of smart metering data., , , , , , , , , and 6 other author(s). J. Cloud Comput., (2019)Capacity planning for dependable services., , , , , and . Theor. Comput. Sci., (October 2023)Vallum-Med: Protecting Medical Data in Cloud Environments., , , , , and . CIKM, page 3397-3400. ACM, (2020)Rearchitecting DNS., , and . IICS, volume P-165 of LNI, page 397-408. GI, (2010)SpecFuzz: Bringing Spectre-type vulnerabilities to the surface., , , and . USENIX Security Symposium, page 1481-1498. USENIX Association, (2020)