Fingerprint Fingerprint is based on mining the text of the persons scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 10 Similar Profiles
Servers Engineering & Materials Science
Access control Engineering & Materials Science
Network protocols Engineering & Materials Science
Quorum Mathematics
Server Mathematics
Intrusion detection Engineering & Materials Science
Communication Engineering & Materials Science
Availability Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Projects 2007 2018

Research Output 1992 2016

  • 6977 Citations
  • 43 h-Index
  • 121 Conference contribution
  • 64 Article
  • 4 Editorial
  • 1 Conference article

8th ACM Cloud computing security workshop

Androulaki, E. & Reiter, M. K. Oct 24 2016 CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Vol. 24-28-October-2016, p. 1882-1883 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Internet
21 Citations

Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition

Sharif, M., Bhagavatula, S., Bauer, L. & Reiter, M. K. Oct 24 2016 CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Vol. 24-28-October-2016, p. 1528-1540 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Crime
Face recognition
Eyeglasses
Learning systems
Biometrics
16 Citations

A software approach to defeating side channels in last-level caches

Zhou, Z., Reiter, M. K. & Zhang, Y. Oct 24 2016 CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Vol. 24-28-October-2016, p. 871-882 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Containers
Security of data
Formal verification
Side channel attack
8 Citations

Gremlin: Systematic Resilience Testing of Microservices

Heorhiadi, V., Rajagopalan, S., Jamjoom, H., Reiter, M. K. & Sekar, V. Aug 8 2016 Proceedings - 2016 IEEE 36th International Conference on Distributed Computing Systems, ICDCS 2016. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-August, p. 57-66 10 p. 7536505

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Testing
Network layers
Life cycle
Internet
Industry

WACCO and LOKO: Strong Consistency at Global Scale

Bethea, D., Reiter, M. K., Qian, F., Xu, Q. & Mao, Z. M. Mar 1 2016 Proceedings - 2015 IEEE Conference on Collaboration and Internet Computing, CIC 2015. Institute of Electrical and Electronics Engineers Inc., p. 130-141 12 p. 7423075

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fault tolerance
Semantics
Topology
Internet