Biblio
Found 34 results
Evaluation of Algorithms for Multipath Route Selection over the Internet. 14th International Conference on the Design of Reliable Communication Networks (DRCN 2018).
.
2018. RECAST: Random Entanglement for Censorship-resistant Archival STorage. IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2018).
.
2018. RockFS: Cloud-backed File System Resilience to Client-Side Attacks. 2018 ACM/IFIP/USENIX International Middleware Conference.
.
2018. S-Audit: Efficient Data Integrity Verification for Cloud Storage. IEEE TrustCom.
.
2018. Securing Electronic Health Records in the Cloud. W-P2DS Workshop, co-located with EuroSys.
.
2018. STeP-Archival: Storage Integrity and Tamper Resistance Using Data Entanglement. IEEE Transactions on Information Theory . 64(6)
.
2018. Storing Critical Data in the Cloud: Challenges and Solutions. 13th International Conference on Software Technologies (ICSOFT).
.
2018. Block placement strategies for fault-resilient distributed tuple spaces: an experimental study. 17th IFIP International Conference on Distributed Applications and Interoperable Systems.
.
2017. DroidPosture: A Trusted Posture Assessment Service for Mobile Devices. Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
.
2017. Hail to the Thief: Protecting Data from Mobile Ransomware with ransomSafeDroid. IEEE 16th International Symposium on Network Computing and Applications (NCA).
.
2017. HTAPBench: Hybrid Transactional and Analytical Processing Benchmark. ICPE '17 Proceedings of the 8th ACM/SPEC on International Conference on Performance Engineering.
.
2017. A Practical Framework for Privacy-Preserving NoSQL Databases. SRDS - 36TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS.
.
2017. Rectify: Black-Box Intrusion Recovery in PaaS Clouds. Proceedings of the 2017 ACM/IFIP/USENIX International Middleware Conference.
.
2017. SafeFS: A modular architecture for secure user-space file systems (one FUSE to rule them all). SYSTOR - Proceedings of the 10th ACM International Systems and Storage Conference.
.
2017. T2Droid: A TrustZone-based Dynamic Analyser for Android Applications. Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom).
.
2017. TruApp: A TrustZone-based Authenticity Detection Service for Mobile Apps. Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
.
2017. Vulnerability-Tolerant Transport Layer Security. Proceedings of the 21st International Conference on Principles of Distributed Systems (OPODIS).
.
2017. Worst-case, information and all-blocks locality in distributed storage systems: An explicit comparison. Proceedings of the 15th Canadian Workshop on Information Theory (CWIT).
.
2017. Authenticated Scalable Port-Knocking. Technische Universität München. B.Sc. Thesis
.
2016. On the cost of safe storage for public clouds: an experimental evaluation. Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems (SRDS).
.
2016. DARSHANA: Detecting Route Hijacking For Communication Confidentiality. The 15th IEEE International Symposium on Network Computing and Applications (NCA 2016).
.
2016. Have a seat on the ErasureBench: Easy evaluation of erasure coding libraries for distributed storage systems. Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems (SRDS) Workshops.
.
2016. Leveraging an Homomorphic Encryption Library to Implement a Coordination Service (short paper). The 15th IEEE International Symposium on Network Computing and Applications (NCA 2016).
.
2016. MACHETE: Multi-path Communication for Cloud Security. The 15th IEEE International Symposium on Network Computing and Applications (NCA 2016).
.
2016. NoSQL Undo: Recovering NoSQL Databases by Undoing Operations. The 15th IEEE International Symposium on Network Computing and Applications (NCA 2016).
.
2016.