Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SinClave: Hardware-assisted Singletons for TEEs., , , and . Middleware, page 85-97. ACM, (2023)Trust Management as a Service: Enabling Trusted Execution in the Face of Byzantine Stakeholders., , , , , , , , , and . DSN, page 502-514. IEEE, (2020)SGX-PySpark: Secure Distributed Data Analytics., , , and . WWW, page 3564-3563. ACM, (2019)secureTF: A Secure TensorFlow Framework., , , , , and . Middleware, page 44-59. ACM, (2020)A High Performance Robot Vision Algorithm Implemented in Python., , , , and . SciPy, page 25-30. scipy.org, (2010)TICAL: Trusted and Integrity-protected Compilation of AppLications., , , , , , and . EDCC, page 25-32. IEEE, (2024)MATEE: multimodal attestation for trusted execution environments., , , and . Middleware, page 121-134. ACM, (2022)PubSub-SGX: Exploiting Trusted Execution Environments for Privacy-Preserving Publish/Subscribe Systems., , , , , , , , , and 2 other author(s). SRDS, page 123-132. IEEE Computer Society, (2018)Clemmys: towards secure remote execution in FaaS., , , , and . SYSTOR, page 44-54. ACM, (2019)CHORS: hardening high-assurance security systems with trusted computing., , , , , and . SAC, page 1626-1635. ACM, (2022)