Author of the publication

HAIL: a high-availability and integrity layer for cloud storage.

, , and . ACM Conference on Computer and Communications Security, page 187-198. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Designing Machine Learning Models for Malicious Network Traffic Classification., , , , and . CoRR, (2019)FlipIt: The Game of "Stealthy Takeover"., , , and . IACR Cryptology ePrint Archive, (2012)User-profile-based analytics for detecting cloud security breaches., , , , and . BigData, page 4529-4535. IEEE Computer Society, (2017)Are Self-Driving Cars Secure? Evasion Attacks Against Deep Neural Networks for Steering Angle Prediction., , , and . IEEE Symposium on Security and Privacy Workshops, page 132-137. IEEE, (2019)Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks., , , , , , and . ACSAC, page 199-208. ACM, (2013)Iris: a scalable cloud file system with efficient integrity checks., , , and . ACSAC, page 229-238. ACM, (2012)HAIL: a high-availability and integrity layer for cloud storage., , and . ACM Conference on Computer and Communications Security, page 187-198. ACM, (2009)How to tell if your cloud files are vulnerable to drive crashes., , , , and . ACM Conference on Computer and Communications Security, page 501-514. ACM, (2011)Lazy Revocation in Cryptographic File Systems., , and . IEEE Security in Storage Workshop, page 1-11. IEEE Computer Society, (2005)Space-Efficient Block Storage Integrity., and . NDSS, The Internet Society, (2005)