Author of the publication

Making Linux Protection Mechanisms Egalitarian with UserFS.

, and . USENIX Security Symposium, page 13-28. USENIX Association, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Zeldovich, Nickolai
add a person with the name Zeldovich, Nickolai
 

Other publications of authors with the same name

Multiprocessor Support for Event-Driven Programs., , , , , and . USENIX Annual Technical Conference, General Track, page 239-252. USENIX, (2003)Experiences in Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise., , , and . CSET, USENIX Association, (2011)Building Web Applications on Top of Encrypted Data Using Mylar., , , , , , and . ;login:, (2014)An Ideal-Security Protocol for Order-Preserving Encoding., , and . IACR Cryptology ePrint Archive, (2013)Overcoming the Worst-Case Curse for Cryptographic Constructions., , , , and . IACR Cryptology ePrint Archive, (2013)Verifying a high-performance crash-safe file system using a tree specification., , , , , , , and . SOSP, page 270-286. ACM, (2017)Using Crash Hoare logic for certifying the FSCQ file system., , , , , and . SOSP, page 18-37. ACM, (2015)Vuvuzela: scalable private messaging resistant to traffic analysis., , , and . SOSP, page 137-152. ACM, (2015)Authenticated storage using small trusted hardware., , , and . CCSW, page 35-46. ACM, (2013)Security bugs in embedded interpreters., , , , , , and . APSys, page 17:1-17:7. ACM, (2013)