-
1
-
-
77955452807
-
Collaborative, privacy-preserving data aggregation at scale
-
PETS'10 Berlin, Heidelberg Springer-Verlag
-
B. Applebaum, H. Ringberg, M. J. Freedman, M. Caesar, and J. Rexford. Collaborative, privacy-preserving data aggregation at scale. In Proceedings of the 10th international conference on Privacy enhancing technologies, PETS'10, pages 56-74, Berlin, Heidelberg, 2010. Springer-Verlag.
-
(2010)
Proceedings of the 10th International Conference on Privacy Enhancing Technologies
, pp. 56-74
-
-
Applebaum, B.1
Ringberg, H.2
Freedman, M.J.3
Caesar, M.4
Rexford, J.5
-
2
-
-
84861079591
-
Outage detection via real-time social stream analysis: Leveraging the power of online complaints
-
New York, NY, USA ACM
-
E. Augustine, C. Cushing, A. Dekhtyar, K. McEntee, K. Paterson, and M. Tognetti. Outage detection via real-time social stream analysis: leveraging the power of online complaints. In Proceedings of the 21st international conference companion on World Wide Web, pages 13-22, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 21st International Conference Companion on World Wide Web
, pp. 13-22
-
-
Augustine, E.1
Cushing, C.2
Dekhtyar, A.3
McEntee, K.4
Paterson, K.5
Tognetti, M.6
-
3
-
-
70349266254
-
Fairplaymp: A system for secure multi-party computation
-
CCS '08 New York, NY, USA ACM
-
A. Ben-David, N. Nisan, and B. Pinkas. Fairplaymp: a system for secure multi-party computation. In Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pages 257-266, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 257-266
-
-
Ben-David, A.1
Nisan, N.2
Pinkas, B.3
-
4
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
STOC '88 New York, NY, USA ACM
-
M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proceedings of the twentieth annual ACM symposium on Theory of computing, STOC '88, pages 1-10, New York, NY, USA, 1988. ACM.
-
(1988)
Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
5
-
-
79958004492
-
Semi-homomorphic encryption and multiparty computation
-
Berlin, Heidelberg Springer-Verlag
-
R. Bendlin, I. Damgård, C. Orlandi, and S. Zakarias. Semi-homomorphic encryption and multiparty computation. In Proc. EUROCRYPT'11, pages 169-188, Berlin, Heidelberg, 2011. Springer-Verlag.
-
(2011)
Proc. EUROCRYPT'11
, pp. 169-188
-
-
Bendlin, R.1
Damgård, I.2
Orlandi, C.3
Zakarias, S.4
-
6
-
-
70350379222
-
Secure multiparty computation goes live
-
R. Dingledine and P. Golle, editors Springer Berlin Heidelberg
-
P. Bogetoft, D. Christensen, I. Damgård, M. Geisler, T. Jakobsen, M. Krøigaard, J. Nielsen, J. Nielsen, K. Nielsen, J. Pagter, M. Schwartzbach, and T. Toft. Secure multiparty computation goes live. In R. Dingledine and P. Golle, editors, Financial Cryptography and Data Security, Volume 5628 of Lecture Notes in Computer Science, pages 325-343. Springer Berlin Heidelberg, 2009.
-
(2009)
Financial Cryptography and Data Security, Volume 5628 of Lecture Notes in Computer Science
, pp. 325-343
-
-
Bogetoft, P.1
Christensen, D.2
Damgård, I.3
Geisler, M.4
Jakobsen, T.5
Krøigaard, M.6
Nielsen, J.7
Nielsen, J.8
Nielsen, K.9
Pagter, J.10
Schwartzbach, M.11
Toft, T.12
-
7
-
-
84893345636
-
Privacy-preserving distributed network troubleshooting? Bridging the gap between theory and practice
-
Dec.
-
M. Burkhart and X. Dimitropoulos. Privacy-preserving distributed network troubleshooting? bridging the gap between theory and practice. ACM Trans. Inf. Syst. Secur., 14(4):31:1-31:30, Dec. 2008.
-
(2008)
ACM Trans. Inf. Syst. Secur.
, vol.14
, Issue.4
, pp. 311-3130
-
-
Burkhart, M.1
Dimitropoulos, X.2
-
9
-
-
78149353011
-
Crowdsourcing service-level network event monitoring
-
SIGCOMM '10 New York, NY, USA ACM
-
D. R. Choffnes, F. E. Bustamante, and Z. Ge. Crowdsourcing service-level network event monitoring. In Proceedings of the ACM SIGCOMM 2010 conference, SIGCOMM '10, pages 387-398, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the ACM SIGCOMM 2010 Conference
, pp. 387-398
-
-
Choffnes, D.R.1
Bustamante, F.E.2
Ge, Z.3
-
10
-
-
14844367057
-
An improved data stream summary: The count-min sketch and its applications
-
G. Cormode and S. Muthukrishnan. An improved data stream summary: the count-min sketch and its applications. Journal of Algorithms, 55(1):58-75, 2005.
-
(2005)
Journal of Algorithms
, vol.55
, Issue.1
, pp. 58-75
-
-
Cormode, G.1
Muthukrishnan, S.2
-
12
-
-
84893398901
-
Extracting benefit from harm: Using malware pollution to analyze the impact of political and geophysical events on the internet
-
A. Dainotti, R. Amman, E. Aben, and K. C. Claffy. Extracting benefit from harm: using malware pollution to analyze the impact of political and geophysical events on the internet. SIGCOMM CCR, 42(1):31-39, 2012.
-
(2012)
SIGCOMM CCR
, vol.42
, Issue.1
, pp. 31-39
-
-
Dainotti, A.1
Amman, R.2
Aben, E.3
Claffy, K.C.4
-
13
-
-
67049134126
-
Asynchronous multiparty computation: Theory and implementation
-
S. Jarecki and G. Tsudik, editors Springer Berlin Heidelberg
-
I. Damgård, M. Geisler, M. Krøigaard, and J. Nielsen. Asynchronous multiparty computation: Theory and implementation. In S. Jarecki and G. Tsudik, editors, Public Key Cryptography - PKC 2009, Volume 5443 of Lecture Notes in Computer Science, pages 160-179. Springer Berlin Heidelberg, 2009.
-
(2009)
Public Key Cryptography - Pkc 2009, Volume 5443 of Lecture Notes in Computer Science
, pp. 160-179
-
-
Damgård, I.1
Geisler, M.2
Krøigaard, M.3
Nielsen, J.4
-
14
-
-
84888211416
-
Collaborative network outage troubleshooting with secure multiparty computation
-
November
-
M. Djatmiko, D. Schatzmann, A. Friedman, X. Dimitropoulos, and R. Boreli. Collaborative network outage troubleshooting with secure multiparty computation. IEEE Communications Magazine, November 2013.
-
(2013)
IEEE Communications Magazine
-
-
Djatmiko, M.1
Schatzmann, D.2
Friedman, A.3
Dimitropoulos, X.4
Boreli, R.5
-
16
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
S. Halevi and T. Rabin, editors Springer Berlin Heidelberg
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In S. Halevi and T. Rabin, editors, Theory of Cryptography, Volume 3876 of Lecture Notes in Computer Science, pages 265-284. Springer Berlin Heidelberg, 2006.
-
(2006)
Theory of Cryptography, Volume 3876 of Lecture Notes in Computer Science
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
17
-
-
84870898677
-
Classifying internet one-way traffic
-
IMC '12 New York, NY, USA ACM
-
E. Glatz and X. Dimitropoulos. Classifying internet one-way traffic. In Proceedings of the 2012 ACM conference on Internet measurement conference, IMC '12, pages 37-50, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 2012 ACM Conference on Internet Measurement Conference
, pp. 37-50
-
-
Glatz, E.1
Dimitropoulos, X.2
-
18
-
-
84870350022
-
A new approach to interdomain routing based on secure multi-party computation
-
HotNets-XI New York, NY, USA ACM
-
D. Gupta, A. Segal, A. Panda, G. Segev, M. Schapira, J. Feigenbaum, J. Rexford, and S. Shenker. A new approach to interdomain routing based on secure multi-party computation. In Proceedi ngs of the 11th ACM Workshop on Hot Topics in Networks, HotNets-XI, pages 37-42, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedi Ngs of the 11th ACM Workshop on Hot Topics in Networks
, pp. 37-42
-
-
Gupta, D.1
Segal, A.2
Panda, A.3
Segev, G.4
Schapira, M.5
Feigenbaum, J.6
Rexford, J.7
Shenker, S.8
-
19
-
-
33744949404
-
Perfsonar: A service oriented architecture for multi-domain network monitoring
-
ICSOC'05
-
A. Hanemann, J. W. Boote, E. L. Boyd, J. Durand, L. Kudarimoti, R. Lapacz, D. M. Swany, S. Trocha, and J. Zurawski. Perfsonar: a service oriented architecture for multi-domain network monitoring. In Proceedings of the Third international conference on Service-Oriented Computing, ICSOC'05, 2005.
-
(2005)
Proceedings of the Third International Conference on Service-Oriented Computing
-
-
Hanemann, A.1
Boote, J.W.2
Boyd, E.L.3
Durand, J.4
Kudarimoti, L.5
Lapacz, R.6
Swany, D.M.7
Trocha, S.8
Zurawski, J.9
-
21
-
-
84893401174
-
Passive corruption in statistical multi-party computation
-
Springer-Verlag
-
M. Hirt, C. Lucas, U. Maurer, and D. Raub. Passive corruption in statistical multi-party computation. In Proc. ICITS'12. Springer-Verlag, 2012.
-
(2012)
Proc. ICITS'12
-
-
Hirt, M.1
Lucas, C.2
Maurer, U.3
Raub, D.4
-
22
-
-
85094641037
-
Studying black holes in the internet with hubble
-
Berkeley, CA, USA USENIX Association
-
E. Katz-Bassett, H. V. Madhyastha, J. P. John, A. Krishnamurthy, D. Wetherall, and T. Anderson. Studying black holes in the internet with hubble. In Proceedings of the 5th USENIX NSDI Symposium, pages 247-262, Berkeley, CA, USA, 2008. USENIX Association.
-
(2008)
Proceedings of the 5th USENIX NSDI Symposium
, pp. 247-262
-
-
Katz-Bassett, E.1
Madhyastha, H.V.2
John, J.P.3
Krishnamurthy, A.4
Wetherall, D.5
Anderson, T.6
-
23
-
-
84866490384
-
Lifeguard: Practical repair of persistent route failures
-
SIGCOMM '12 New York, NY, USA ACM
-
E. Katz-Bassett, C. Scott, D. R. Choffnes, I. Cunha, V. Valancius, N. Feamster, H. V. Madhyastha, T. Anderson, and A. Krishnamurthy. Lifeguard: practical repair of persistent route failures. In Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication, SIGCOMM '12, pages 395-406, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
, pp. 395-406
-
-
Katz-Bassett, E.1
Scott, C.2
Choffnes, D.R.3
Cunha, I.4
Valancius, V.5
Feamster, N.6
Madhyastha, H.V.7
Anderson, T.8
Krishnamurthy, A.9
-
25
-
-
84893416287
-
-
NANOG. http://www.nanog.org/.
-
-
-
-
26
-
-
84893391331
-
-
outages@outages.org
-
outages@outages.org. The outages mailinglist. http://puck.nether.net/ mailman/listinfo/outages.
-
The Outages Mailinglist
-
-
-
28
-
-
34248348792
-
Privacy-preserving performance measurements
-
MineNet '06 New York, NY, USA ACM
-
M. Roughan and Y. Zhang. Privacy-preserving performance measurements. In Proceedi ngs of the 2006 SIGCOMM workshop on Mining network data, MineNet '06, pages 329-334, New York, NY, USA, 2006. ACM.
-
(2006)
Proceedi Ngs of the 2006 SIGCOMM Workshop on Mining Network Data
, pp. 329-334
-
-
Roughan, M.1
Zhang, Y.2
-
29
-
-
33847327063
-
Secure distributed data-mining and its application to large-scale network measurements
-
Jan.
-
M. Roughan and Y. Zhang. Secure distributed data-mining and its application to large-scale network measurements. SIGCOMM Comput. Commun. Rev., 36(1):7-14, Jan. 2006.
-
(2006)
SIGCOMM Comput. Commun. Rev.
, vol.36
, Issue.1
, pp. 7-14
-
-
Roughan, M.1
Zhang, Y.2
-
30
-
-
84893376957
-
-
Route Views Page. http://www.routeviews.org.
-
-
-
-
31
-
-
79952918906
-
FACT: Flow-based approach for connectivity tracking
-
Berlin, Heidelberg Springer-Verlag
-
D. Schatzmann, S. Leinen, J. Kögel, and W. Mühlbauer. FACT: flow-based approach for connectivity tracking. In Proc. PAM'11, pages 214-223, Berlin, Heidelberg, 2011. Springer-Verlag.
-
(2011)
Proc. PAM'11
, pp. 214-223
-
-
Schatzmann, D.1
Leinen, S.2
Kögel, J.3
Mühlbauer, W.4
-
32
-
-
0018545449
-
How to share a secret
-
Nov.
-
A. Shamir. How to share a secret. Commun. ACM, 22(11):612-613, Nov. 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
33
-
-
84870868863
-
Detecting prefix hijackings in the internet with argus
-
IMC '12 New York, NY, USA ACM
-
X. Shi, Y. Xiang, Z. Wang, X. Yin, and J. Wu. Detecting prefix hijackings in the internet with argus. In Proceedings of the 2012 ACM conference on Internet measurement conference, IMC '12, pages 15-28, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 2012 ACM Conference on Internet Measurement Conference
, pp. 15-28
-
-
Shi, X.1
Xiang, Y.2
Wang, Z.3
Yin, X.4
Wu, J.5
-
35
-
-
84873286899
-
Perfsonar: Instantiating a global network measurement framework
-
B. Tierney, J. Metzger, J. Boote, E. Boyd, A. Brown, R. Carlson, M. Zekauskas, J. Zurawski, M. Swany, and M. Grigoriev. perfsonar: Instantiating a global network measurement framework. In 4th Workshop on Real Overlays and Distributed Systems, 2009.
-
(2009)
4th Workshop on Real Overlays and Distributed Systems
-
-
Tierney, B.1
Metzger, J.2
Boote, J.3
Boyd, E.4
Brown, A.5
Carlson, R.6
Zekauskas, M.7
Zurawski, J.8
Swany, M.9
Grigoriev, M.10
-
36
-
-
34248382818
-
Planetseer: Internet path failure monitoring and characterization in wide-area services
-
Berkeley, CA, USA USENIX Association
-
M. Zhang, C. Zhang, V. Pai, L. Peterson, and R. Wang. Planetseer: internet path failure monitoring and characterization in wide-area services. In Proceedings of the 6th OSDI Conference, pages 12-12, Berkeley, CA, USA, 2004. USENIX Association.
-
(2004)
Proceedings of the 6th OSDI Conference
, pp. 12-12
-
-
Zhang, M.1
Zhang, C.2
Pai, V.3
Peterson, L.4
Wang, R.5
-
37
-
-
36949036650
-
A light-weight distributed scheme for detecting ip prefix hijacks in real-time
-
New York, NY, USA ACM
-
C. Zheng, L. Ji, D. Pei, J. Wang, and P. Francis. A light-weight distributed scheme for detecting ip prefix hijacks in real-time. In Proceedings of the ACM SIGCOMM 2007 Conference, pages 277-288, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the ACM SIGCOMM 2007 Conference
, pp. 277-288
-
-
Zheng, C.1
Ji, L.2
Pei, D.3
Wang, J.4
Francis, P.5
|