Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Groundhog - A Serial ATA Host Bus Adapter (HBA) for FPGAs., and . FCCM, page 220-223. IEEE Computer Society, (2012)Leakier Wires: Exploiting FPGA Long Wires for Covert- and Side-channel Attacks., , and . TRETS, 12 (3): 11:1-11:29 (2019)Secure database-as-a-service with Cipherbase., , , , , , , , and . SIGMOD Conference, page 1033-1036. ACM, (2013)Characterization of Long Wire Data Leakage in Deep Submicron FPGAs., , , , , and . FPGA, page 292-297. ACM, (2019)A message from the general chair and program chair., and . ASAP, page 1. IEEE Computer Society, (2017)Querying encrypted data., , , and . ICDE, page 1262-1263. IEEE Computer Society, (2013)Engineering Security and Performance with Cipherbase., , , , , , , , and . IEEE Data Eng. Bull., 35 (4): 65-72 (2012)Information Leakage Between FPGA Long Wires., and . CoRR, (2016)Pushing the Limits of Encrypted Databases with Secure Hardware., , , , , , , and . CoRR, (2018)Transaction processing on confidential data using cipherbase., , , , , and . ICDE, page 435-446. IEEE Computer Society, (2015)