Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Confidential Container Groups: Implementing confidential computing on Azure container instances., , , , , , , and . ACM Queue, (March 2024)When Concurrency Matters: Behaviour-Oriented Concurrency., , , , , , , and . Proc. ACM Program. Lang., 7 (OOPSLA2): 1531-1560 (October 2023)IA-CCF: Individual Accountability for Permissioned Ledgers., , , , , , , , , and 5 other author(s). NSDI, page 467-491. USENIX Association, (2022)'Pony': co-designing a type system and a runtime.. Imperial College London, UK, (2017)British Library, EThOS.snmalloc: a message passing allocator., , , , , , , , and . ISMM, page 122-135. ACM, (2019)Wait-Free Weak Reference Counting, , and . Proceedings of the 2023 ACM SIGPLAN International Symposium on Memory Management, page 85–96. New York, NY, USA, Association for Computing Machinery, (Jun 6, 2023)PAC: Practical Accountability for CCF., , , , , , , , , and 2 other author(s). CoRR, (2021)COCOAEXPO: Confidential Containers via Attested Execution Policies., , , , , , , and . CoRR, (2023)Why Should I Trust Your Code?: Confidential computing enables users to authenticate code running in TEEs, but users also need evidence this code is trustworthy., , , , , , and . ACM Queue, 21 (4): 94-122 (2023)Confidential Consortium Framework: Secure Multiparty Applications with Confidentiality, Integrity, and High Availability., , , , , , , , , and 5 other author(s). CoRR, (2023)