Author of the publication

Se-Lambda: Securing Privacy-Sensitive Serverless Applications Using SGX Enclave.

, , and . SecureComm (1), volume 254 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 451-470. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reliability Analysis for Grid Computing., , , and . GCC, volume 3251 of Lecture Notes in Computer Science, page 787-790. Springer, (2004)DRIC: Dependable Grid Computing Framework., , , and . IEICE Trans. Inf. Syst., 89-D (2): 612-623 (2006)CloudAC: a cloud-oriented multilayer access control system for logic virtual domain., , , , , and . IET Inf. Secur., 7 (1): 51-59 (2013)Proactive recovery approach for intrusion tolerance with dynamic configuration of physical and virtual replicas., , , , , and . Secur. Commun. Networks, 5 (10): 1169-1180 (2012)A Skip-gram-based Framework to Extract Knowledge from Chinese Reviews in Cloud Environment., , , and . Mob. Networks Appl., 20 (3): 363-369 (2015)CloudTB: A quick and reliable testbed for virtual machine based cloud computing systems., , , , and . CONIELECOMP, page 40-47. IEEE, (2015)CloudCFI: Context-Sensitive and Incremental CFI in the Cloud Environment., , , , and . IEEE Trans. Cloud Comput., 9 (3): 938-957 (2021)Defending Against Flow Table Overloading Attack in Software-Defined Networks., , , , , and . IEEE Trans. Serv. Comput., 12 (2): 231-246 (2019)Research on Group Signature Scheme with Forward Security., , , and . J. Comput. Res. Dev., 43 (12): 2069-2075 (2006)Patch-Related Vulnerability Detection Based on Symbolic Execution., , , , , and . IEEE Access, (2017)