Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Schear, Nabil
add a person with the name Schear, Nabil
 

Other publications of authors with the same name

Models of Privacy Preserving Traffic Tunneling., and . Simulation, 85 (9): 589-607 (2009)Neon: system support for derived data management., , , , , , , , and . VEE, page 63-74. ACM, (2010)A Secure Cloud with Minimal Provider Trust., , , , , , , , , and 5 other author(s). HotCloud, USENIX Association, (2018)Website Detection Using Remote Traffic Analysis., , , and . Privacy Enhancing Technologies, volume 7384 of Lecture Notes in Computer Science, page 58-78. Springer, (2012)MAVMM: Lightweight and Purpose Built VMM for Malware Analysis., , , , , and . ACSAC, page 441-450. IEEE Computer Society, (2009)Retrofitting Applications with Provenance-Based Security Monitoring., , , , , , and . CoRR, (2016)Website Detection Using Remote Traffic Analysis, , , and . CoRR, (2011)Transparent Web Service Auditing via Network Provenance Functions., , , , , , , and . WWW, page 887-895. ACM, (2017)A survey of cryptographic approaches to securing big-data analytics in the cloud., , , , and . HPEC, page 1-6. IEEE, (2014)Performance Analysis of Real Traffic Carried with Encrypted Cover Flows., and . PADS, page 80-87. IEEE Computer Society, (2008)