Author of the publication

Pasture: Secure Offline Data Access Using Commodity Trusted Hardware.

, , , , and . OSDI, page 321-334. USENIX Association, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Wireless ad hoc VoIP., and . MNCNA, page 8. ACM, (2007)Contrail: Enabling Decentralized Social Networks on Smartphones., , , , , , and . Middleware, volume 7049 of Lecture Notes in Computer Science, page 41-60. Springer, (2011)Peer-to-Peer Data Replication Meets Delay Tolerant Networking., , , and . ICDCS, page 109-120. IEEE Computer Society, (2011)From theory to practice: Fundamental properties and services of mobile ad hoc networks.. ETH Zurich, Zürich, Switzerland, (2008)base-search.net (ftethz:oai:www.research-collection.ethz.ch:20.500.11850/72907).SymPhone: design and implementation of a VoIP peer for Symbian mobile phones using Bluetooth and SIP., , , and . WMASH, page 63-70. ACM, (2006)SIPHoc: Efficient SIP Middleware for Ad Hoc Networks., , , and . Middleware, volume 4834 of Lecture Notes in Computer Science, page 60-79. Springer, (2007)Log-normal shadowing meets SINR: A numerical study of Capacity in Wireless Networks., and . SECON, page 550-559. IEEE, (2007)The Duality between Message Routing and Epidemic Data Replication., , , and . HotNets, ACM SIGCOMM, (2009)Enabling social networking in ad hoc networks of mobile phones., , , and . Proc. VLDB Endow., 2 (2): 1634-1637 (2009)Docx2Go: collaborative editing of fidelity reduced documents on mobile devices., , , , , and . MobiSys, page 345-356. ACM, (2010)