Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network-Wide Forwarding Anomaly Detection and Localization in Software Defined Networks., , , , , , , , and . IEEE/ACM Trans. Netw., 29 (1): 332-345 (2021)Balancing storage efficiency and data confidentiality with tunable encrypted deduplication., , , , and . EuroSys, page 22:1-22:15. ACM, (2020)Repair Pipelining for Erasure-coded Storage: Algorithms and Evaluation., , , , , , and . ACM Trans. Storage, 17 (2): 13:1-13:29 (2021)Secure and Lightweight Deduplicated Storage via Shielded Deduplication-Before-Encryption., , and . USENIX Annual Technical Conference, page 37-52. USENIX Association, (2022)Tunable Encrypted Deduplication with Attack-resilient Key Management., , , and . ACM Trans. Storage, 18 (4): 32:1-32:38 (2022)FOCES: Detecting Forwarding Anomalies in Software Defined Networks., , , , , , and . ICDCS, page 830-840. IEEE Computer Society, (2018)Enabling Secure and Space-Efficient Metadata Management in Encrypted Deduplication., , , , , , and . IEEE Trans. Computers, 71 (4): 959-970 (2022)Repair Pipelining for Erasure-Coded Storage: Algorithms and Evaluation., , , , , , and . CoRR, (2019)Accelerating Encrypted Deduplication via SGX., , , , and . USENIX Annual Technical Conference, page 957-971. USENIX Association, (2021)