Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computing with time: microarchitectural weird machines., , , , , and . ASPLOS, page 758-772. ACM, (2021)A co-processor approach for accelerating data-structure intensive algorithms., , , and . ICCD, page 431-438. IEEE Computer Society, (2010)Mathematical limits of parallel computation for embedded systems., , , and . ASP-DAC, page 653-660. IEEE, (2011)TPM-SIM: a framework for performance evaluation of trusted platform modules., , , , and . DAC, page 236-241. ACM, (2011)Runtime Attestation for IAAS Clouds., , , , , , and . CLOSER, page 233-247. SciTePress, (2018)ROP Defense in the Cloud through LIve Text Page-level Re-ordering - The LITPR System., , , , , and . CLOSER, page 191-200. SciTePress, (2017)A Non-Inclusive Memory Permissions architecture for protection against cross-layer attacks., , , and . HPCA, page 201-212. IEEE Computer Society, (2014)RIC: Relaxed Inclusion Caches for Mitigating LLC Side-Channel Attacks., , , , , , and . DAC, page 7:1-7:6. ACM, (2017)Secure NDN Packet Encapsulation., , , , , , , and . ICC, page 1106-1111. IEEE, (2023)Investigating the Synergy between Routing and Forwarding Strategy in NDN Networks., , , , , and . ICN, page 67-77. ACM, (2023)