-
1
-
-
0034444963
-
Feasibility of a serverless distributed file system deployed on an existing set of desktop pcs
-
New York, NY, USA, ACM
-
William J. Bolosky, John R. Douceur, David Ely, and Marvin Theimer. Feasibility of a serverless distributed file system deployed on an existing set of desktop pcs. In Proceedings of the 2000 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS '00, pages 34-43, New York, NY, USA, 2000. ACM.
-
(2000)
Proceedings of the 2000 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS '00
, pp. 34-43
-
-
Bolosky, W.J.1
Douceur, J.R.2
Ely, D.3
Theimer, M.4
-
2
-
-
0001038609
-
Practical byzantine fault tolerance
-
Berkeley, CA, USA, USENIX Association
-
Miguel Castro and Barbara Liskov. Practical byzantine fault tolerance. In Proceedings of the Third Symposium on Operating Systems Design and Implementation, OSDI '99, pages 173-186, Berkeley, CA, USA, 1999. USENIX Association.
-
(1999)
Proceedings of the Third Symposium on Operating Systems Design and Implementation, OSDI '99
, pp. 173-186
-
-
Castro, M.1
Liskov, B.2
-
3
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
David L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM, 24(2):84-90, February 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.L.1
-
5
-
-
0032201622
-
Private information retrieval
-
November
-
Benny Chor, Eyal Kushilevitz, Oded Goldreich, and Madhu Sudan. Private information retrieval. J. ACM, 45(6):965-981, November 1998.
-
(1998)
J. ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
7
-
-
33744479345
-
Freenet: A distributed anonymous information storage and retrieval system
-
New York, NY, USA, Springer-Verlag New York, Inc
-
Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong. Freenet: A distributed anonymous information storage and retrieval system. In International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, pages 46-66, New York, NY, USA, 2001. Springer-Verlag New York, Inc.
-
(2001)
International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability
, pp. 46-66
-
-
Clarke, I.1
Sandberg, O.2
Wiley, B.3
Hong, T.W.4
-
8
-
-
0036041927
-
Wide-area cooperative storage with cfs
-
New York, NY, USA, ACM
-
Frank Dabek, M. Frans Kaashoek, David Karger, Robert Morris, and Ion Stoica. Wide-area cooperative storage with cfs. In Proceedings of the Eighteenth ACM Symposium on Operating Systems Principles, SOSP '01, pages 202-215, New York, NY, USA, 2001. ACM.
-
(2001)
Proceedings of the Eighteenth ACM Symposium on Operating Systems Principles, SOSP '01
, pp. 202-215
-
-
Dabek, F.1
Kaashoek, M.F.2
Karger, D.3
Morris, R.4
Stoica, I.5
-
9
-
-
0003302799
-
The Free Haven Project: Distributed Anonymous Storage Service
-
R. Dingledine, M.J. Freedman, and D. Molnar. The Free Haven Project: Distributed Anonymous Storage Service. Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000: Proceedings, 2001.
-
(2001)
Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000: Proceedings
-
-
Dingledine, R.1
Freedman, M.J.2
Molnar, D.3
-
10
-
-
84976721142
-
On the possibility and impossibility of achieving clock synchronization
-
New York, NY, USA, ACM
-
Danny Dolev, Joe Halpern, and H. Raymond Strong. On the possibility and impossibility of achieving clock synchronization. In Proceedings of the Sixteenth Annual ACM Symposium on Theory of Computing, STOC '84, pages 504-511, New York, NY, USA, 1984. ACM.
-
(1984)
Proceedings of the Sixteenth Annual ACM Symposium on Theory of Computing, STOC '84
, pp. 504-511
-
-
Dolev, D.1
Halpern, J.2
Strong, H.R.3
-
11
-
-
33646501487
-
Gradient clock synchronization
-
March
-
Rui Fan and Nancy Lynch. Gradient clock synchronization. Distrib. Comput., 18(4):255-266, March 2006.
-
(2006)
Distrib. Comput.
, vol.18
, Issue.4
, pp. 255-266
-
-
Fan, R.1
Lynch, N.2
-
12
-
-
79958247985
-
Fundamental limits on synchronizing clocks over networks
-
Nikolaos M. Freris, Scott R. Graham, and P. R. Kumar. Fundamental limits on synchronizing clocks over networks. IEEE Trans. Automat. Contr., 56(6):1352-1364, 2011.
-
(2011)
IEEE Trans. Automat. Contr.
, vol.56
, Issue.6
, pp. 1352-1364
-
-
Freris, N.M.1
Graham, S.R.2
Kumar, P.R.3
-
13
-
-
84937574654
-
A random server model for private information retrieval or how to achieve information theoretic pir avoiding database replication
-
London, UK, UK, Springer-Verlag
-
Yael Gertner, Shafi Goldwasser, and Tal Malkin. A random server model for private information retrieval or how to achieve information theoretic pir avoiding database replication. In Proceedings of the Second International Workshop on Randomization and Approximation Techniques in Computer Science, RANDOM '98, pages 200-217, London, UK, UK, 1998. Springer-Verlag.
-
(1998)
Proceedings of the Second International Workshop on Randomization and Approximation Techniques in Computer Science, RANDOM '98
, pp. 200-217
-
-
Gertner, Y.1
Goldwasser, S.2
Malkin, T.3
-
14
-
-
0031675225
-
Towards an archival intermemory
-
IEEE Computer Society
-
Andrew V. Goldberg and Peter N. Yianilos. Towards an archival intermemory. In ADL, pages 147-156. IEEE Computer Society, 1998.
-
(1998)
ADL
, pp. 147-156
-
-
Goldberg, A.V.1
Yianilos, P.N.2
-
15
-
-
0032639183
-
The swarm scalable storage system
-
J.H. Hartman, I. Murdock, and T. Spalink. The swarm scalable storage system. In Distributed Computing Systems, 1999. Proceedings. 19th IEEE International Conference on, pages 74-81, 1999.
-
(1999)
Distributed Computing Systems, 1999. Proceedings. 19th IEEE International Conference on
, pp. 74-81
-
-
Hartman, J.H.1
Murdock, I.2
Spalink, T.3
-
16
-
-
0030645662
-
Reducing the cost of security in link-state routing
-
R. Hauser, T. Przygienda, and G. Tsudik. Reducing the cost of security in link-state routing. In Network and Distributed System Security, 1997. Proceedings., 1997 Symposium on, pages 93-99, 1997.
-
(1997)
Network and Distributed System Security, 1997. Proceedings., 1997 Symposium on
, pp. 93-99
-
-
Hauser, R.1
Przygienda, T.2
Tsudik, G.3
-
18
-
-
11244269535
-
Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
Yih-Chun Hu, David B. Johnson, and Adrian Perrig. Sead: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks, 1:175-192, 2003.
-
(2003)
Ad Hoc Networks
, vol.1
, pp. 175-192
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
19
-
-
1542317831
-
Rushing attacks and defense in wireless ad hoc network routing protocols
-
New York, NY, USA, ACM
-
Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Rushing attacks and defense in wireless ad hoc network routing protocols. In Proceedings of the 2Nd ACM Workshop on Wireless Security, WiSe '03, pages 30-40, New York, NY, USA, 2003. ACM.
-
(2003)
Proceedings of the 2Nd ACM Workshop on Wireless Security, WiSe '03
, pp. 30-40
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
20
-
-
17444426121
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
January
-
Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks, 11(1-2):21-38, January 2005.
-
(2005)
Wireless Networks
, vol.11
, Issue.1-2
, pp. 21-38
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
21
-
-
0033743163
-
Secure border gateway protocol s-bgp
-
Stephen Kent, Charles Lynn, Joanne Mikkelson, and Karen Seo. Secure border gateway protocol (s-bgp. IEEE Journal on Selected Areas in Communications, 18:103-116, 2000.
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, pp. 103-116
-
-
Kent, S.1
Lynn, C.2
Mikkelson, J.3
Seo, K.4
-
22
-
-
77956246759
-
Optimal gradient clock synchronization in dynamic networks
-
New York, NY, USA, ACM
-
Fabian Kuhn, Christoph Lenzen, Thomas Locher, and Rotem Oshman. Optimal gradient clock synchronization in dynamic networks. In Proceedings of the 29th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, PODC '10, pages 430-439, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 29th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, PODC '10
, pp. 430-439
-
-
Kuhn, F.1
Lenzen, C.2
Locher, T.3
Oshman, R.4
-
23
-
-
0012580890
-
Integration of security in network routing protocols
-
April
-
Brijesh Kumar. Integration of security in network routing protocols. SIGSAC Rev., 11(2):18-25, April 1993.
-
(1993)
SIGSAC Rev.
, vol.11
, Issue.2
, pp. 18-25
-
-
Kumar, B.1
-
24
-
-
0021654066
-
Byzantine clock synchronization
-
New York, NY, USA, ACM
-
Leslie Lamport and P. M. Melliar-Smith. Byzantine clock synchronization. In Proceedings of the Third Annual ACM Symposium on Principles of Distributed Computing, PODC '84, pages 68-74, New York, NY, USA, 1984. ACM.
-
(1984)
Proceedings of the Third Annual ACM Symposium on Principles of Distributed Computing, PODC '84
, pp. 68-74
-
-
Lamport, L.1
Melliar-Smith, P.M.2
-
25
-
-
84976699318
-
The byzantine generals problem
-
July
-
Leslie Lamport, Robert Shostak, and Marshall Pease. The byzantine generals problem. ACM Trans. Program. Lang. Syst., 4(3):382-401, July 1982.
-
(1982)
ACM Trans. Program. Lang. Syst.
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
26
-
-
57949099988
-
Clock synchronization with bounded global and local skew
-
Washington, DC, USA, IEEE Computer Society
-
Christoph Lenzen, Thomas Locher, and Roger Wattenhofer. Clock synchronization with bounded global and local skew. In Proceedings of the 2008 49th Annual IEEE Symposium on Foundations of Computer Science, FOCS '08, pages 509-518, Washington, DC, USA, 2008. IEEE Computer Society.
-
(2008)
Proceedings of the 2008 49th Annual IEEE Symposium on Foundations of Computer Science, FOCS '08
, pp. 509-518
-
-
Lenzen, C.1
Locher, T.2
Wattenhofer, R.3
-
27
-
-
33845217044
-
Oblivious gradient clock synchronization
-
Berlin, Heidelberg, Springer-Verlag
-
Thomas Locher and Roger Wattenhofer. Oblivious gradient clock synchronization. In Proceedings of the 20th International Conference on Distributed Computing, DISC'06, pages 520-533, Berlin, Heidelberg, 2006. Springer-Verlag.
-
(2006)
Proceedings of the 20th International Conference on Distributed Computing, DISC'06
, pp. 520-533
-
-
Locher, T.1
Wattenhofer, R.2
-
28
-
-
0021470560
-
An upper and lower bound for clock synchronization
-
August/September
-
Jennifer Lundelius and Nancy A. Lynch. An upper and lower bound for clock synchronization. Information and Control, 62(2/3):190-204, August/September 1984.
-
(1984)
Information and Control
, vol.62
, Issue.2-3
, pp. 190-204
-
-
Lundelius, J.1
Lynch, N.A.2
-
29
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
New York, NY, USA, ACM
-
Sergio Marti, T. J. Giuli, Kevin Lai, and Mary Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, MobiCom '00, pages 255-265, New York, NY, USA, 2000. ACM.
-
(2000)
Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, MobiCom '00
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
30
-
-
0003973079
-
-
Addison Wesley Longman Publishing Co., Inc., Redwood City, CA, USA
-
Radia Perlman. Interconnections: Bridges and Routers. Addison Wesley Longman Publishing Co., Inc., Redwood City, CA, USA, 1992.
-
(1992)
Interconnections: Bridges and Routers
-
-
Perlman, R.1
-
31
-
-
0242426103
-
The tesla broadcast authentication protocol
-
Adrian Perrig, Ran Canetti, J. D˜. Tygar, and Dawn Song. The tesla broadcast authentication protocol. RSA CryptoBytes, 5, 2002.
-
(2002)
RSA CryptoBytes
, vol.5
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D˜.3
Song, D.4
-
32
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
September
-
Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victor Wen, and David E. Culler. Spins: Security protocols for sensor networks. Wirel. Netw., 8(5):521-534, September 2002.
-
(2002)
Wirel. Netw.
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
34
-
-
84940989519
-
An orthogonal multiple access coding scheme
-
Jonathan Ponniah, Yih-Chun Hu, and P.R. Kumar. An orthogonal multiple access coding scheme. Communications in Information and Systems, 12(1):41-76, 2012.
-
(2012)
Communications in Information and Systems
, vol.12
, Issue.1
, pp. 41-76
-
-
Ponniah, J.1
Hu, Y.-C.2
Kumar, P.R.3
-
35
-
-
0001777423
-
Anonymous web transactions with crowds
-
February
-
Michael K. Reiter and Aviel D. Rubin. Anonymous web transactions with crowds. Commun. ACM, 42(2):32-48, February 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.2
, pp. 32-48
-
-
Reiter, M.K.1
Rubin, A.D.2
-
36
-
-
77958453959
-
Secure topology discovery through network-wide clock synchronization
-
July
-
R.S. Robles, J.J. Haas, J.T. Chiang, Yih-Chun Hu, and P.R. Kumar. Secure topology discovery through network-wide clock synchronization. In Signal Processing and Communications (SPCOM), 2010 International Conference on, pages 1-5, July 2010.
-
(2010)
Signal Processing and Communications (SPCOM), 2010 International Conference on
, pp. 1-5
-
-
Robles, R.S.1
Haas, J.J.2
Chiang, J.T.3
Hu, Y.-C.4
Kumar, P.R.5
-
37
-
-
0036038685
-
Storage management and caching in past, a large-scale, persistent peer-to-peer storage utility
-
New York, NY, USA, ACM
-
Antony Rowstron and Peter Druschel. Storage management and caching in past, a large-scale, persistent peer-to-peer storage utility. In Proceedings of the Eighteenth ACM Symposium on Operating Systems Principles, SOSP '01, pages 188-201, New York, NY, USA, 2001. ACM.
-
(2001)
Proceedings of the Eighteenth ACM Symposium on Operating Systems Principles, SOSP '01
, pp. 188-201
-
-
Rowstron, A.1
Druschel, P.2
-
38
-
-
0842283101
-
A secure routing protocol for ad hoc networks
-
K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, and E.M. Belding-Royer. A secure routing protocol for ad hoc networks. In Network Protocols, 2002. Proceedings. 10th IEEE International Conference on, pages 78-87, 2002.
-
(2002)
Network Protocols, 2002. Proceedings. 10th IEEE International Conference on
, pp. 78-87
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
39
-
-
0030695529
-
Securing distance-vector routing protocols
-
B.R. Smith, S. Murthy, and J.J. Garcia-Luna-Aceves. Securing distance-vector routing protocols. In Network and Distributed System Security, 1997. Proceedings., 1997 Symposium on, pages 85-92, 1997.
-
(1997)
Network and Distributed System Security, 1997. Proceedings., 1997 Symposium on
, pp. 85-92
-
-
Smith, B.R.1
Murthy, S.2
Garcia-Luna-Aceves, J.J.3
-
40
-
-
85084163931
-
Publius: A robust, tamper-evident, censorship-resistant web publishing system
-
SSYM'00, Berkeley, CA, USA, USENIX Association
-
Marc Waldman, Aviel D. Rubin, and Lorrie Faith Cranor. Publius: A robust, tamper-evident, censorship-resistant web publishing system. In Proceedings of the 9th Conference on USENIX Security Symposium - Volume 9, SSYM'00, pages 5-5, Berkeley, CA, USA, 2000. USENIX Association.
-
(2000)
Proceedings of the 9th Conference on USENIX Security Symposium
, vol.9
, pp. 5-5
-
-
Waldman, M.1
Rubin, A.D.2
Cranor, L.F.3
-
41
-
-
0342410321
-
Survivable information storage systems
-
J.J. Wylie, M.W. Bigrigg, J.D. Strunk, G.R. Ganger, H. Kiliccote, and P.K. Khosla. Survivable information storage systems. Computer, 33(8):61-68, 2000.
-
(2000)
Computer
, vol.33
, Issue.8
, pp. 61-68
-
-
Wylie, J.J.1
Bigrigg, M.W.2
Strunk, J.D.3
Ganger, G.R.4
Kiliccote, H.5
Khosla, P.K.6
-
42
-
-
2442582716
-
Secure ad hoc on-demand distance vector routing
-
June
-
Manel Guerrero Zapata. Secure ad hoc on-demand distance vector routing. SIGMOBILE Mob. Comput. Commun. Rev., 6(3):106-107, June 2002.
-
(2002)
SIGMOBILE Mob. Comput. Commun. Rev.
, vol.6
, Issue.3
, pp. 106-107
-
-
Zapata, M.G.1
-
44
-
-
0033357103
-
Securing ad hoc networks
-
Lidong Zhou and Z.J. Haas. Securing ad hoc networks. Network, IEEE, 13(6):24-30, 1999.
-
(1999)
Network, IEEE
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
|