Author of the publication

Secure Routing for Structured Peer-to-Peer Overlay Networks.

, , , , and . OSDI, USENIX Association, (2002)Operating Systems Review 36, Special Issue, Winter 2002.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ostra: Leveraging Trust to Thwart Unwanted Communication., , , and . NSDI, page 15-30. USENIX Association, (2008)Enforcing Fair Sharing of Peer-to-Peer Resources., , and . IPTPS, volume 2735 of Lecture Notes in Computer Science, page 149-159. Springer, (2003)Accountable Virtual Machines., , , and . OSDI, page 119-134. USENIX Association, (2010)Qapla: Policy compliance for database-backed systems., , , , and . USENIX Security Symposium, page 1463-1479. USENIX Association, (2017)Locality-Aware Request Distribution in Cluster-based Network Servers., , , , , , and . ASPLOS, page 205-216. ACM Press, (1998)Peer-assisted content distribution in Akamai netsession., , , , , , , , and . Internet Measurement Conference, page 31-42. ACM, (2013)EnCore: private, context-based communication for mobile social apps., , , , , and . MobiSys, page 135-148. ACM, (2014)You are who you know: inferring user profiles in online social networks, , , and . Proceedings of the third ACM international conference on Web search and data mining, page 251--260. New York, NY, USA, ACM, (2010)Lazy Receiver Processing (LRP): A Network Subsystem Architecture for Server Systems., and . OSDI, page 261-275. ACM, (1996)Operating Systems Review 30, Special Issue, October 1996.Privacy Capsules: Preventing Information Leaks by Mobile Apps., , , and . MobiSys, page 399-411. ACM, (2016)