Author of the publication

Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider.

, , , and . USENIX Security Symposium, page 647-662. USENIX Association, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Free Haven Project: Reputation, , and . (2002)SANE: a protection architecture for enterprise networks, , , , , , and . Proceedings of the 15th conference on USENIX Security Symposium - Volume 15, Berkeley, CA, USA, (2006)Fairness and isolation in multi-tenant storage as optimization decomposition., , and . ACM SIGOPS Oper. Syst. Rev., 47 (1): 16-21 (2013)Increasing network resilience through edge diversity in NEBULA., , , , , , , and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 16 (3): 14-20 (2012)Privacy Engineering for Digital Rights Management Systems., , , and . Digital Rights Management Workshop, volume 2320 of Lecture Notes in Computer Science, page 76-105. Springer, (2001)Tarzan: a peer-to-peer anonymizing network layer., and . ACM Conference on Computer and Communications Security, page 193-206. ACM, (2002)Scalable flow-based networking with DIFANE., , , and . SIGCOMM, page 351-362. ACM, (2010)From Feast to Famine: Managing Mobile Network Resources Across Environments and Preferences., , and . TRIOS, USENIX Association, (2014)Efficient Compactions between Storage Tiers with PrismDB., , , and . ASPLOS (3), page 179-193. ACM, (2023)Ravana: controller fault-tolerance in software-defined networking., , , and . SOSR, page 4:1-4:12. ACM, (2015)