From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Guidelines for Using the CryptDB System Securely., , и . IACR Cryptology ePrint Archive, (2015)Hare: a file system for non-cache-coherent multicores., , , и . EuroSys, стр. 30:1-30:16. ACM, (2015)CryptDB: processing queries on an encrypted database., , , и . Commun. ACM, 55 (9): 103-111 (2012)Grove: a Separation-Logic Library for Verifying Distributed Systems., , , , и . SOSP, стр. 113-129. ACM, (2023)Practical and Effective Sandboxing for Non-root Users., и . USENIX Annual Technical Conference, стр. 139-144. USENIX Association, (2013)Efficiently Mitigating Transient Execution Attacks using the Unmapped Speculation Contract., , , , , и . OSDI, стр. 1139-1154. USENIX Association, (2020)Karaoke: Distributed Private Messaging Immune to Passive Traffic Analysis., , и . OSDI, стр. 711-725. USENIX Association, (2018)Verifying Hardware Security Modules with Information-Preserving Refinement., , и . OSDI, стр. 503-519. USENIX Association, (2022)Securing untrustworthy software using information flow control.. Stanford University, USA, (2008)Nail: A Practical Interface Generator for Data Formats., и . IEEE Symposium on Security and Privacy Workshops, стр. 158-166. IEEE Computer Society, (2014)