Author of the publication

Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage.

, , , , and . CCS, page 131-145. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Association of DeepLearning-Based Fundus Age Difference with Carotid Atherosclerosis and Mortality., , , , , , , , , and 4 other author(s). BIBM, page 1179-1181. IEEE, (2019)Scalable and efficient approach for secure group communication using proxy cryptography., and . Wirel. Networks, 18 (4): 413-425 (2012)Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage., , , , and . CCS, page 131-145. ACM, (2018)Decentralized group key management for dynamic networks using proxy cryptography., , and . Q2SWinet, page 123-129. ACM, (2007)Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage., , , and . ICDE, page 69-70. IEEE Computer Society, (2017)An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks., , , and . ICOIN, volume 5200 of Lecture Notes in Computer Science, page 629-638. Springer, (2007)A Hybrid Deduplication for Secure and Efficient Data Outsourcing in Fog Computing., , , and . CloudCom, page 285-293. IEEE Computer Society, (2016)SEED: Enabling Serverless and Efficient Encrypted Deduplication for Cloud Storage., , , and . CloudCom, page 482-487. IEEE Computer Society, (2016)Secure proof of storage with deduplication for cloud storage systems., , , and . Multim. Tools Appl., 76 (19): 19363-19378 (2017)Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs., , , , and . WISA, volume 4298 of Lecture Notes in Computer Science, page 349-363. Springer, (2006)