Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bringing Full-Scale TCP to Low-Power Networks., , , and . SenSys, page 386-387. ACM, (2018)DISTIL: Design and implementation of a scalable synchrophasor data processing system., , , , and . SmartGridComm, page 271-277. IEEE, (2015)Mr. Plotter: Unifying Data Reduction Techniques in Storage and Visualization Systems., , and . CoRR, (2021)Performant TCP for Low-Power Wireless Networks., , , and . NSDI, page 911-932. USENIX Association, (2020)Skyplane: Optimizing Transfer Cost and Throughput Using Cloud-Aware Overlays., , , , , and . NSDI, page 1375-1389. USENIX Association, (2023)Rethinking System Design for Expressive Cryptography. University of California, Berkeley, USA, (2023)JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT., , , , and . USENIX Security Symposium, page 1519-1536. USENIX Association, (2019)Ghostor: Toward a Secure Data-Sharing System from Decentralized Trust., , and . NSDI, page 851-877. USENIX Association, (2020)MAGE: Nearly Zero-Cost Virtual Memory for Secure Computation., , and . OSDI, page 367-385. USENIX Association, (2021)WAVE: A Decentralized Authorization Framework with Transitive Delegation., , , , , , , and . USENIX Security Symposium, page 1375-1392. USENIX Association, (2019)