Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The case for crypto protocol awareness inside the OS kernel., and . SIGARCH Comput. Archit. News, 33 (1): 58-64 (2005)Analyzing Network Traffic with Chimera., , and . login Usenix Mag., (2013)Authentication on Untrusted Remote Hosts with Public-Key Sudo., , and . LISA, page 103-107. USENIX Association, (2008)Accelerating application-level security protocols., and . ICON, page 313-318. IEEE, (2003)Online Network Forensics for Automatic Repair Validation., , and . IWSEC, volume 5312 of Lecture Notes in Computer Science, page 136-151. Springer, (2008)Path-Based Access Control for Enterprise Networks., and . ISC, volume 5222 of Lecture Notes in Computer Science, page 191-203. Springer, (2008)F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services., and . ISC, volume 5735 of Lecture Notes in Computer Science, page 491-506. Springer, (2009)Low Latency Anonymity with Mix Rings., and . ISC, volume 4176 of Lecture Notes in Computer Science, page 32-45. Springer, (2006)Cryptography as an operating system service: A case study., , , and . ACM Trans. Comput. Syst., 24 (1): 1-38 (2006)Pushing Boulders Uphill: The Difficulty of Network Intrusion Recovery., , and . LISA, page 1-13. USENIX Association, (2009)