Author of the publication

IoT Expunge: Implementing Verifiable Retention of IoT Data.

, , , , , and . CODASPY, page 283-294. ACM, (2020)Due to the escalation of the COVID-19 situation around the world, CODASPY'20 was postponed to early fall 2020..

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Domain-independent data cleaning via analysis of entity-relationship graph, and . ACM Trans. Database Syst., 31 (2): 716--767 (2006)Semantically Ranked Graph Pattern Queries for Link Analysis., and . ISI, page 296-299. IEEE, (2007)Supporting Approximate Similarity Queries with Quality Guarantees in P2P Systems., , , , , and . COMAD, page 60-71. Tata McGraw-Hill Publishing Company Limited, (2006)Exploiting relationships for object consolidation., , and . IQIS, page 47-58. ACM, (2005)Towards breaking the quality curse.: a web-querying approach to web people search., , and . SIGIR, page 27-34. ACM, (2008)Ensuring Transaction Atomicity in Multidatabase Systems., , , , and . PODS, page 164-175. ACM Press, (1992)On Correctness of Non-serializable Executions., , , , and . PODS, page 97-108. ACM Press, (1993)iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage., , , , and . EDBT, volume 261 of ACM International Conference Proceeding Series, page 710-714. ACM, (2008)Browsing and retrieving video content in a unified framework., , and . MMSP, page 9-14. IEEE, (1998)Towards Reliable Application Data Broadcast in Wireless Ad Hoc Networks., , , , and . WCNC, page 4063-4068. IEEE, (2007)