The overhead from combating side-channels in cloud systems using VM-scheduling N Juma, J Shahen, K Bijon, M Tripunitara IEEE transactions on dependable and secure computing 17 (2), 422-435, 2018 | 15 | 2018 |
Forensic analysis in access control: foundations and a case-study from practice N Juma, X Huang, M Tripunitara Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 5 | 2020 |
A computational complexity analysis of tunable type inference for Generic Universe Types N Juma, W Dietl, M Tripunitara Theoretical Computer Science 814, 189-209, 2020 | 3 | 2020 |
Locked Circuit Indistinguishability: A Notion of Security for Logic Locking M El Massad, N Juma, J Shahen, M Raykova, S Garg, M Tripunitara 2022 IEEE 35th Computer Security Foundations Symposium (CSF), 455-470, 2022 | | 2022 |
Problems in Cloud Security, Access Control and Logic Locking N Juma University of Waterloo, 2020 | | 2020 |
Complexity Analysis of Tunable Type Inference for Generic Universe Types N Juma University of Waterloo, 2015 | | 2015 |