Author of the publication

Outsourcing multi-version key-value stores with verifiable data freshness.

, , , , , and . ICDE, page 1214-1217. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IPSECvalidate: A Tool to Validate IPSEC Configurations., , , , and . LISA, page 19-24. USENIX, (2001)Retrofitting the IBM POWER Hypervisor to Support Mandatory Access Control., , and . ACSAC, page 221-231. IEEE Computer Society, (2007)Synthesizing near-optimal malware specifications from suspicious behaviors., , , , and . MALWARE, page 41-50. IEEE Computer Society, (2013)Analyzing Integrity Protection in the SELinux Example Policy., , and . USENIX Security Symposium, USENIX Association, (2003)vTPM: Virtualizing the Trusted Platform Module., , , , , and . USENIX Security Symposium, USENIX Association, (2006)An Evolutionary Approach to Multilaterally Secure Services in ISDN / IN.. ICCCN, page 276-283. IEEE Computer Society, (1998)TVDc: managing security in the trusted virtual datacenter., , , , , , , and . Operating Systems Review, 42 (1): 40-47 (2008)Authentication for Distributed Web Caches., , , and . ESORICS, volume 2502 of Lecture Notes in Computer Science, page 126-145. Springer, (2002)Detecting Malicious Exploit Kits using Tree-based Similarity Searches., , , , , , and . CODASPY, page 255-266. ACM, (2016)Resolving constraint conflicts., , and . SACMAT, page 105-114. ACM, (2004)