Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A universal method for composing business transaction models using logs., , , and . Integrated Network Management, page 17-24. IEEE, (2009)On the Design and Quantification of Privacy Preserving Data Mining Algorithms., and . PODS, ACM, (2001)A note on information-theoretic secret key exchange over wireless channels., , and . Allerton, page 754-761. IEEE, (2009)Trojan Detection using IC Fingerprinting., , , , and . S&P, page 296-310. IEEE Computer Society, (2007)SparkBench - A Spark Performance Testing Suite., , , , , , , , , and . TPCTC, volume 9508 of Lecture Notes in Computer Science, page 26-44. Springer, (2015)Selectively retrofitting monitoring in distributed systems., , , and . SIGMETRICS Perform. Evaluation Rev., 37 (2): 6-8 (2009)Fundamental Limits on the Anonymity Provided by the MIX Technique., , , and . S&P, page 86-99. IEEE Computer Society, (2006)Policy-Based Validation of SAN Configuration., , , , and . POLICY, page 77-86. IEEE Computer Society, (2004)The EM Side-Channel(s)., , , and . CHES, volume 2523 of Lecture Notes in Computer Science, page 29-45. Springer, (2002)Policy management for networked systems and applications., , , , and . Integrated Network Management, page 455-468. IEEE, (2005)