Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Green: Towards a Pollution-Free Peer-to-Peer Content Sharing Service, , , , and . CoRR, (2011)Securing key issuing in peer-to-peer networks., , , , , , and . SAC, page 84-85. ACM, (2009)Efficient GPU Sharing for Serverless Workflows., , , , , , , , and . HiPS@HPDC, page 17-24. ACM, (2021)Privacy-Preserving Data Analytics., , , , , and . Encyclopedia of Big Data Technologies, Springer, (2019)Phagocytes: A Holistic Defense and Protection Against Active P2P Worms, , , , and . CoRR, (2011)Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks., , , , , and . Peer-to-Peer Computing, page 22-29. IEEE Computer Society, (2008)Gradient Compression Supercharged High-Performance Data Parallel DNN Training., , , , , , , and . SOSP, page 359-375. ACM, (2021)Non-tracking web analytics., , , , and . CCS, page 687-698. ACM, (2012)WebIBC: Identity Based Cryptography for Client Side Security in Web Applications., , , , , and . ICDCS, page 689-696. IEEE Computer Society, (2008)Bring order to online social networks., , and . INFOCOM, page 541-545. IEEE, (2011)