What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
George Candea
Google Scholar
14
publications in security and cryptology related venues
Year
Venue
Title
2015
conf/sp
High System-Code Security with Low Overhead.
Jonas Wagner
Volodymyr Kuznetsov
George Candea
Johannes Kinder
2013
conf/dsn
Message from the DCCS program chair.
George Candea
2011
conf/dsn
WaRR: A tool for high-fidelity web application record and replay.
Silviu Andrica
George Candea
2011
conf/dsn
Enabling sophisticated analyses of ×86 binaries with RevGen.
Vitaly Chipounov
George Candea
2011
conf/dsn
Exterminating bugs via collective information recycling.
George Candea
2011
conf/dsn
Automated vulnerability discovery in distributed systems.
Radu Banabic
George Candea
Rachid Guerraoui
2011
conf/dsn
Communix: A framework for collaborative deadlock immunity.
Horatiu Jula
Pinar Tözün
George Candea
2011
conf/dsn
Platform-wide deadlock immunity for mobile phones.
Horatiu Jula
Thomas Rensch
George Candea
2010
conf/dsn
iProve: A scalable technique for consumer-verifiable software guarantees.
Silviu Andrica
Horatiu Jula
George Candea
2010
conf/dsn
Studying application-library interaction and behavior with LibTrac.
Eric Bisolfati
Paul Dan Marinescu
George Candea
2009
conf/dsn
LFI: A practical and general library-level fault injector.
Paul Dan Marinescu
George Candea
2008
conf/dsn
ConfErr: A tool for assessing resilience to human configuration errors.
Lorenzo Keller
Prasang Upadhyaya
George Candea
2005
conf/dsn
Workshop on Hot Topics in System Depend - Workshop Abstract.
George Candea
David Oppenheimer
2002
conf/dsn
Reducing Recovery Time in a Small Recursively Restartable System.
George Candea
James W. Cutler
Armando Fox
Rushabh Doshi
Priyank Garg
Rakesh Gowda
Coauthors
Armando Fox
(1)
David Oppenheimer
(1)
Eric Bisolfati
(1)
George Candea
(14)
Horatiu Jula
(3)
James W. Cutler
(1)
Johannes Kinder
(1)
Jonas Wagner
(1)
Lorenzo Keller
(1)
Paul Dan Marinescu
(2)
Pinar Tözün
(1)
Prasang Upadhyaya
(1)
Priyank Garg
(1)
Rachid Guerraoui
(1)
Radu Banabic
(1)
Rakesh Gowda
(1)
Rushabh Doshi
(1)
Silviu Andrica
(2)
Thomas Rensch
(1)
Vitaly Chipounov
(1)
Volodymyr Kuznetsov
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to