Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EyeQ: Practical Network Performance Isolation for the Multi-tenant Cloud., , , , and . HotCloud, USENIX Association, (2012)Multiprocessor Support for Event-Driven Programs., , , , , and . USENIX Annual Technical Conference, General Track, page 239-252. USENIX, (2003)A Future-Adaptable Password Scheme., and . USENIX Annual Technical Conference, FREENIX Track, page 81-91. USENIX, (1999)Secure Applications Need Flexible Operating Systems., and . Workshop on Hot Topics in Operating Systems, page 56-61. IEEE Computer Society, (1997)True2F: Backdoor-resistant authentication tokens., , , , and . CoRR, (2018)Secure Acknowledgment of Multicast Messages in Open Peer-to-Peer Networks., and . IPTPS, volume 3279 of Lecture Notes in Computer Science, page 259-268. Springer, (2004)Addressing covert termination and timing channels in concurrent information flow systems., , , , , and . ICFP, page 201-214. ACM, (2012)Flexible dynamic information flow control in Haskell., , , and . Haskell, page 95-106. ACM, (2011)Building secure systems with LIO (demo)., , , and . Haskell, page 93-94. ACM, (2014)Building Secure Systems with LIO (Demo)., and . PLAS@ECOOP, page 25. ACM, (2014)