Radu Sion
Orcid: 0000-0002-1237-8276Affiliations:
- Stony Brook University, USA
According to our database1,
Radu Sion
authored at least 126 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
2022
Found. Trends Priv. Secur., 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
An REE-independent Approach to Identify Callers of TEEs in TrustZone-enabled Cortex-M Devices.
Proceedings of the 8th ACM on Cyber-Physical System Security Workshop, 2022
2021
IEEE Trans. Knowl. Data Eng., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
2020
Proc. Priv. Enhancing Technol., 2020
Proc. Priv. Enhancing Technol., 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
IEEE Trans. Cloud Comput., 2019
PD-DM: An efficient locality-preserving block device mapper with plausible deniability.
Proc. Priv. Enhancing Technol., 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
DataLair: Efficient Block Storage with Plausible Deniability against Multi-Snapshot Adversaries.
Proc. Priv. Enhancing Technol., 2017
Droidsentry: Efficient Code Integrity and Control Flow Verification on TrustZone Devices.
Proceedings of the 21st International Conference on Control Systems and Computer Science, 2017
Proceedings of the 8th Asia-Pacific Workshop on Systems, Mumbai, India, September 2, 2017, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
Modern Cryptography and Security: An Inter-Community Dialogue (Dagstuhl Seminar 16051).
Dagstuhl Reports, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the 15th IEEE/ACM International Symposium on Cluster, 2015
2014
IEEE Trans. Knowl. Data Eng., 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014
Proceedings of the ACM Symposium on Cloud Computing, 2014
2013
ACM Trans. Inf. Syst. Secur., 2013
Proceedings of the Secure Data Management - 10th VLDB Workshop, 2013
Proceedings of the 2013 IEEE International Symposium on Parallel & Distributed Processing, 2013
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013
To cloud my big data or not to?: musings at the intersection of big data, intense computing and clouds.
Proceedings of the ScienceCloud'13, 2013
Proceedings of the 20th Annual International Conference on High Performance Computing, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
IEEE Trans. Inf. Forensics Secur., 2012
IEEE Trans. Inf. Forensics Secur., 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proc. VLDB Endow., 2011
Proceedings of the 20th ACM International Symposium on High Performance Distributed Computing, 2011
Proceedings of the 19th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2011
Proceedings of the Financial Cryptography and Data Security, 2011
Proceedings of the ACM Symposium on Cloud Computing in conjunction with SOSP 2011, 2011
Poster: making the case for intrinsic personal physical unclonable functions (IP-PUFs).
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the Handbook of Financial Cryptography and Security., 2010
ACM Trans. Sens. Networks, 2010
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Proceedings of the 2nd Workshop on the Theory and Practice of Provenance, 2010
Proceedings of the Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
Proceedings of the Encyclopedia of Database Systems, 2009
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009
Proceedings of the Network and Distributed System Security Symposium, 2009
Proceedings of the 7th USENIX Conference on File and Storage Technologies, 2009
Proceedings of the Fourth Biennial Conference on Innovative Data Systems Research, 2009
2008
Proceedings of the Handbook of Database Security - Applications and Trends, 2008
Proceedings of the Handbook of Database Security - Applications and Trends, 2008
Proceedings of the Handbook of Database Security - Applications and Trends, 2008
Proceedings of the Network and Distributed System Security Symposium, 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008
Building castles out of mud: practical access pattern privacy and correctness on untrusted storage.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
Proceedings of the Secure Data Management in Decentralized Systems, 2007
Future Gener. Comput. Syst., 2007
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007
Proceedings of the 2007 ACM Workshop On Storage Security And Survivability, 2007
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007
Proceedings of the Network and Distributed System Security Symposium, 2007
Proceedings of the Financial Cryptography and Data Security, 2007
Proceedings of the Financial Cryptography and Data Security, 2007
2006
Proceedings of the Financial Cryptography and Data Security, 2006
Proceedings of the Advances in Database Technology, 2006
2005
Proceedings of the 31st International Conference on Very Large Data Bases, Trondheim, Norway, August 30, 2005
Evolving Toward the Perfect Schedule: Co-scheduling Job Assignments and Data Replication in Wide-Area Systems Using a Genetic Algorithm.
Proceedings of the Job Scheduling Strategies for Parallel Processing, 2005
Proceedings of the 2005 IEEE International Conference on Web Services (ICWS 2005), 2005
Proceedings of the Database and Expert Systems Applications, 16th International Conference, 2005
2004
Proceedings of the (e)Proceedings of the Thirtieth International Conference on Very Large Data Bases, VLDB 2004, Toronto, Canada, August 31, 2004
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004
Proceedings of the 20th International Conference on Data Engineering, 2004
Proceedings of the 20th International Conference on Data Engineering, 2004
Proceedings of the Advances in Database Technology, 2004
2003
Proceedings of the Digital Watermarking, Second International Workshop, 2003
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003
2002
Proceedings of 28th International Conference on Very Large Data Bases, 2002
Proceedings of the Digital Watermarking, First International Workshop, 2002
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002
Proceedings of the Information Hiding, 5th International Workshop, 2002
2000