Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PubSub-SGX: Exploiting Trusted Execution Environments for Privacy-Preserving Publish/Subscribe Systems., , , , , , , , , and 2 other author(s). CoRR, (2019)Practical Aspects of IP Take-Over Mechanisms., and . WORDS Fall, page 250-254. IEEE Computer Society, (2003)Fault Management in ECLIPSE., and . WORDS, page 28-33. IEEE Computer Society, (2001)Fault-tolerant and scalable TCP splice and web server architecture., , and . SRDS, page 301-310. IEEE Computer Society, (2006)ControlFreak: Signature Chaining to Counter Control Flow Attacks., and . SRDS, page 84-93. IEEE Computer Society, (2015)Compiling for Resilience: the Performance Gap., , , and . PARCO, volume 27 of Advances in Parallel Computing, page 721-730. IOS Press, (2015)An Adaptive Failure Detection Protocol., , and . PRDC, page 146-153. IEEE Computer Society, (2001)TCP Server Fault Tolerance Using Connection Migration to a Backup Server., , and . DSN, page 373-382. IEEE Computer Society, (2003)Topic 8 Distributed Systems and Algorithms., , , and . Euro-Par, volume 4641 of Lecture Notes in Computer Science, page 549. Springer, (2007)SpecFuzz: Bringing Spectre-type vulnerabilities to the surface., , , and . USENIX Security Symposium, page 1481-1498. USENIX Association, (2020)