Author of the publication

Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters.

, , , , and . RAID, volume 9404 of Lecture Notes in Computer Science, page 48-65. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A TPM-based architecture for improved security and anonymity in vehicular ad hoc networks., and . VNC, page 1-7. IEEE, (2009)Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting., , , , and . SECRYPT, page 379-386. SciTePress, (2013)Linear Speed-Up for Cellular Automata Synchronizers and Applications.. Theor. Comput. Sci., 188 (1-2): 45-57 (1997)Confidentiality Issues on a GPU in a Virtualized Environment., , , and . Financial Cryptography, volume 8437 of Lecture Notes in Computer Science, page 119-135. Springer, (2014)C5: Cross-Cores Cache Covert Channel., , , and . DIMVA, volume 9148 of Lecture Notes in Computer Science, page 46-64. Springer, (2015)Efficient Constant Speed-Up for one Dimensional Cellular Automata Calculators.. Parallel Computing, 23 (11): 1663-1671 (1997)Improving Secure Device Insertion in Home Ad-hoc Networks Keyword Latencies., , and . SEC, volume 147 of IFIP, page 381-394. Kluwer / Springer, (2004)Pretty Private Group Management, , , and . CoRR, (2011)On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks., , and . WISTP, volume 5746 of Lecture Notes in Computer Science, page 1-11. Springer, (2009)Improving the Resistance to Side-Channel Attacks on Cloud Storage Services., , , and . NTMS, page 1-5. IEEE, (2012)