Author of the publication

Satem: Trusted Service Code Execution across Transactions.

, , and . SRDS, page 321-336. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Iftode, Liviu
add a person with the name Iftode, Liviu
 

Other publications of authors with the same name

Scope Consistency: A Bridge between Release Consistency and Entry Consistency., , and . Theory Comput. Syst., 31 (4): 451-473 (1998)Guest editorial., , , and . Pervasive and Mobile Computing, (2005)Smart Messages: A System Architecture for Large Networks of Embedded Systems., , , and . HotOS, page 181. IEEE Computer Society, (2001)Automated containment of rootkits attacks., , and . Computers & Security, 27 (7-8): 323-334 (2008)Improving Release-Consistent Shared Virtual Memory Using Automatic Update., , , and . HPCA, page 14-25. IEEE Computer Society, (1996)Automatic Inference and Enforcement of Kernel Data Structure Invariants., , and . ACSAC, page 77-86. IEEE Computer Society, (2008)Bringing the Cloud Down to Earth: Transient PCs Everywhere., , , , and . MobiCASE, volume 76 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 315-322. Springer, (2010)Spatial Programming Using Smart Messages: Design and Implementation., , , , and . ICDCS, page 690-699. IEEE Computer Society, (2004)Guest Editors' Introduction: The Smart Phone--A First Platform for Pervasive Computing., , and . IEEE Pervasive Computing, 4 (2): 18-19 (2005)Vehicular Communication., , , , , , , , and . IEEE Pervasive Computing, 5 (4): 55-62 (2006)