Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PAST: Probabilistic Authentication of Sensor Timestamps., and . ACSAC, page 439-448. IEEE Computer Society, (2006)Super-Resolution Video Analysis for Forensic Investigations., and . IFIP Int. Conf. Digital Forensics, volume 242 of IFIP, page 281-299. Springer, (2007)On the (f)utility of untrusted data sanitization., , , , and . MILCOM, page 1261-1266. IEEE, (2011)Efficient querying of distributed provenance stores., , and . HPDC, page 613-621. ACM, (2010)Maximizing availability of content in disruptive environments by cross-layer optimization., , , , , and . SAC, page 447-454. ACM, (2013)ProvMark: A Provenance Expressiveness Benchmarking System., , , , , , , and . Middleware, page 268-279. ACM, (2019)Bonsai: Balanced Lineage Authentication., and . ACSAC, page 363-373. IEEE Computer Society, (2007)Parameterizing access control for heterogeneous peer-to-peer applications., and . SecureComm, page 269-278. IEEE, (2007)ICEMAN: A Practical Architecture for Situational Awareness at the Network Edge., , , , , , , , and . Logic, Rewriting, and Concurrency, volume 9200 of Lecture Notes in Computer Science, page 617-631. Springer, (2015)ICEMAN: A System for Efficient, Robust and Secure Situational Awareness at the Network Edge., , , , , , , , and . MILCOM, page 1512-1517. IEEE, (2013)