Author of the publication

Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data.

, , , , and . ACM Trans. Comput. Syst., 35 (4): 13:1-13:32 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A case study of using eye tracking techniques to evaluate the usability of e-learning courses., and . IJLT, 7 (2): 154-171 (2012)Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data., , , , and . OSDI, page 533-549. USENIX Association, (2016)Experimental Development of Competitive Digital Educational Games on Multi-touch Screen for Young Children., , , , and . Edutainment, volume 6249 of Lecture Notes in Computer Science, page 367-375. Springer, (2010)A Conceptual Model for the Shareability of e-Courses in China., and . LTEC, page 49-60. Springer, (2013)Synergistic Learning for Knowledge Age: Theoretical Model, Enabling Technology and Analytical Framework., , and . ICWL, volume 4823 of Lecture Notes in Computer Science, page 207-217. Springer, (2007)Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data., , , , and . ;login:, (2017)EIIS: An Educational Information Intelligent Search Engine Supported by Semantic Services., , , , , and . Int. J. Distance Educ. Technol., 9 (1): 21-43 (2011)PS-DA Model of Game Addiction: Theoretical Hypothesis and Case Analysis., and . Edutainment, volume 3942 of Lecture Notes in Computer Science, page 444-452. Springer, (2006)TxFS: Leveraging File-system Crash Consistency to Provide ACID Transactions., , , , , , and . TOS, 15 (2): 9:1-9:20 (2019)Grid Authorization Management Oriented to Large-Scale Collaborative Computing., , , and . CSCWD (Selected papers), volume 3168 of Lecture Notes in Computer Science, page 55-66. Springer, (2004)