Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RECAST: Random Entanglement for Censorship-Resistant Archival STorage., , , , and . DSN, page 171-182. IEEE Computer Society, (2018)LEGaTO: towards energy-efficient, secure, fault-tolerant toolset for heterogeneous computing., , , , , , , , , and 26 other author(s). CF, page 276-278. ACM, (2018)CYCLOSA: Decentralizing Private Web Search through SGX-Based Browser Extensions., , , , , , , , and . ICDCS, page 467-477. IEEE Computer Society, (2018)SGX-Aware Container Orchestration for Heterogeneous Clusters., , , , , and . ICDCS, page 730-741. IEEE Computer Society, (2018)UniCrawl: A Practical Geographically Distributed Web Crawler., , , , , and . CLOUD, page 389-396. IEEE Computer Society, (2015)Security, Performance and Energy Implications of Hardware-Assisted Memory Protection Mechanisms on Event-Based Streaming Systems., , , , , , and . SRDS, page 264-266. IEEE Computer Society, (2018)TOPiCo: detecting most frequent items from multiple high-rate event streams., , , , , and . DEBS, page 58-67. ACM, (2015)On The Performance of ARM TrustZone., and . CoRR, (2019)A posteriori defensive programming: an annotation toolkit for DoS-resistant component-based architectures., and . SAC, page 1734-1738. ACM, (2006)Using Trusted Execution Environments for Secure Stream Processing of Medical Data., , , , , and . CoRR, (2019)