Search

Your search keyword '"Felber, Pascal"' showing total 885 results

Search Constraints

Start Over You searched for: Author "Felber, Pascal" Remove constraint Author: "Felber, Pascal"
885 results on '"Felber, Pascal"'

Search Results

1. BlindexTEE: A Blind Index Approach towards TEE-supported End-to-end Encrypted DBMS

2. CryptoAnalytics: Cryptocoins Price Forecasting with Machine Learning Techniques

3. Practical Forecasting of Cryptocoins Timeseries using Correlation Patterns

4. A Comprehensive Trusted Runtime for WebAssembly with Intel SGX

5. Fortress: Securing IoT Peripherals with Trusted Execution Environments

6. A Holistic Approach for Trustworthy Distributed Systems with WebAssembly and TEEs

7. BlindexTEE: A Blind Index Approach Towards TEE-Supported End-to-End Encrypted DBMS

8. SecV: Secure Code Partitioning via Multi-Language Secure Values

9. Mitigating Adversarial Attacks in Federated Learning with Trusted Execution Environments

10. Preventing EFail Attacks with Client-Side WebAssembly: The Case of Swiss Post's IncaMail

11. VEDLIoT -- Next generation accelerated AIoT systems and applications

12. NVMM cache design: Logging vs. Paging

13. Montsalvat: Intel SGX Shielding for GraalVM Native Images

14. SGX Switchless Calls Made Configless

15. VEDLIoT: Very Efficient Deep Learning in IoT

16. WebAssembly as a Common Layer for the Cloud-edge Continuum

17. WaTZ: A Trusted WebAssembly Runtime Environment with Remote Attestation for TrustZone

18. PCRAFT: Capacity Planning for Dependable Stateless Services

19. Attestation Mechanisms for Trusted Execution Environments Demystified

20. An Exploratory Study of Attestation Mechanisms for Trusted Execution Environments

22. Scrooge Attack: Undervolting ARM Processors for Profit

23. NVCache: A Plug-and-Play NVMM-based I/O Booster for Legacy Systems

24. Security, Performance and Energy Implications of Hardware-assisted Memory Protection Mechanisms on Event-based Streaming Systems

25. Plinius: Secure and Persistent Machine Learning Model Training

26. Twine: An Embedded Trusted Runtime for WebAssembly

27. ZipLine: In-Network Compression at Line Speed

28. TEEMon: A continuous performance monitoring framework for TEEs

29. Promoting Computational Thinking Skills in Non-Computer-Science Students: Gamifying Computational Notebooks to Increase Student Engagement

30. PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep Learning Clusters

31. TZ4Fabric: Executing Smart Contracts with ARM TrustZone

32. FaaSdom: A Benchmark Suite for Serverless Computing

33. Hermes: Enabling Energy-efficient IoT Networks with Generalized Deduplication

34. Trust Management as a Service: Enabling Trusted Execution in the Face of Byzantine Stakeholders

36. A Wait-Free Universal Construct for Large Objects

37. ABEONA: an Architecture for Energy-Aware Task Migrations from the Edge to the Cloud

38. Network-Aware Container Scheduling in Multi-Tenant Data Center

39. iperfTZ: Understanding Network Bottlenecks for TrustZone-based Trusted Applications

40. Differential Approximation and Sprinting for Multi-Priority Big Data Engines

41. Anonymous and confidential file sharing over untrusted clouds

42. Malware in the SGX supply chain: Be careful when signing enclaves!

43. HEATS: Heterogeneity- and Energy-Aware Task-based Scheduling

44. Stress-SGX: Load and Stress your Enclaves for Fun and Profit

45. Developing Secure Services for IoT with OP-TEE: A First Look at Performance and Usability

46. Security, Performance and Energy Trade-offs of Hardware-assisted Memory Protection Mechanisms

47. PubSub-SGX: Exploiting Trusted Execution Environments for Privacy-Preserving Publish/Subscribe Systems

48. Capacity Planning for Dependable Services

49. Alpha Entanglement Codes: Practical Erasure Codes to Archive Data in Unreliable Environments

50. SGX-Aware Container Orchestration for Heterogeneous Clusters

Catalog

Books, media, physical & digital resources