usenix_logo_notag_white
Sign In
Conferences
Attend
Registration Information
Registration Discounts
Student Grants
Diversity Grants
Venue, Hotel, and Travel
Program
Program at a Glance
Technical Sessions
Training Program
Activities
Birds-of-a-Feather Sessions (BoFs)
Poster Session and Reception
Work-in-Progress Reports (WiPs)
Participate
Call for Papers
Call for Posters and WiPs
Instructions for Presenters
Sponsors
Exhibitor Services
About
Conference Organizers
Past Conferences
Conference Policies
Code of Conduct
Christof Fetzer
Linked Presentation:
SPEICHER: Securing LSM-based Key-Value Stores using Shielded Execution