Articles on Distributed-system and Network Security
- Preventing Active Timing Attacks in Low-Latency Anonymous Communication
Joan Feigenbaum
, Aaron Johnson
and Paul Syverson
- Putting BGP on the Right Path: a Case for Next-Hop Routing
Michael Schapira
, Yaping Zhu
and Jennifer Rexford
- Distributed Computing With Adaptive Heuristics
Aaron D. Jaggard
, Michael Schapira
and Rebecca N. Wright
- Best-Response Mechanisms
Noam Nisan
, Michael Schapira
, Gregory Valiant
and Aviv Zohar
- How secure are secure interdomain routing protocols?
Sharon Goldberg
, Michael Schapira
, Peter Hummon
and Jennifer Rexford
- Incentive compatibility and dynamics of congestion control
Brighten Godfrey
, Michael Schapira
, Aviv Zohar
and Scott Shenker
- On the Structure of Weakly-Acyclic Games
Alex Fabraikant
, Aaron D. Jaggard
and Michael Schapira
- Computation and incentives in combinatorial public projects
David Buchfuhrer
, Michael Schapira
and Yaron Singer
- Distributed Internet Security and Measurement
Josh Karlin
- Trade-offs in Cost Sharing
Mukund Sundararajan
- Design and Analysis of Efficient Anonymous-Communication Protocols
Aaron Johnson
- Towards a Unified Approach to (In)Decision: Routing, Games, Circuits, Consensus, and Beyond
Aaron D. Jaggard
, Michael Schapira
and Rebecca N. Wright
- Inapproximability for VCG-Based Combinatorial Auctions
Dave Buchfuhrer
, Shaddin Dughmi
, Hu Fu
, Robert Kleinberg
, Elchanan Mossel
, Christos Papadimitriou
, Michael Schapira
, Yaron Singer
and Chris Umans
- Neighbor-specific BGP: more flexible routing policies while improving global stability
Yi Wang
, Michael Schapira
and Jennifer Rexford
- Distributed Systems of Simple Interacting Agents
Hong Jiang
- Anonymous Data Collection in Sensor Networks
James Horey
, Michael M.Groat
, Stephanie Forrest
and Fernando Esponda
- Radial Structure of the Internet
Petter Holme
, Josh Karlin
and Staphanie Forrest
- Protecting Data Privacy through Hard-to-Reverse Negative Databases
Fernando Esponda
, Elena Ackley
, Paul Helman
, Haixia Jia
and Stephanie Forrest
- Self-stabilizing Leader Election in Networks of Finite-state
Anonymous Agents
Michael J. Fischer
and Hong Jiang
- Increasing Communications Security through Protocol Parameter Diversity
G. Barrantes
and Stephanie Forrest
- Stabilizing Consensus in Mobile Networks
Dana Angluin
, Michael J. Fischer
and Hong Jiang
- Learning DFA representations of HTTP for protecting web
applications
Ken Ingham
, Anil Somayaji
, Stephanie Forrest
and John Burge
- Pretty Good BGP: Improving BGP by cautiously adopting
routes
J. Karlin
, J. Rexford
and Stephanie Forrest
- Our Data, Ourselves: Privacy via Distributed Noise
Generation
Cynthia Dwork
, Krishnaram Kenthapadi
, Frank McSherry
, Ilya Mironov
and Moni Naor
- Achieving Anonymity via Clustering
Gagan Aggarwal
, Tomas Feder
, Krishnaram Kenthapadi
, Samir Khuller
, Rina Panigrahy
, Dilys Thomas
and An Zhu
- Balanced Allocation on Graphs
Krishnaram Kenthapadi
and Rina Panigrahy
- Protecting Browser State from Web Privacy Attacks
Collin Jackson
, Andrew Bortz
, Dan Boneh
and John C. Mitchell
- Analyzing the Efficiency of BitTorrent and Related
Peer-to-Peer Networks
David Arthur
and Rina Panigrahy
- A Modular Correctness Proof of IEEE 802.11i and TLS
Changhua He
, Mukund Sundararajan
, Anupam Datta
, Ante Derek
and John C. Mitchell
- Self-stabilizing behavior in networks of nondeterministically
interacting sensors
Dana Angluin
, James Aspnes
, Michael J. Fischer
and Hong Jiang
- Trust and reputation in peer-to-peer networks
Sergio Marti
- Security Configuration Management
Bob Mungamuru
, Chris Olston
and Hector Garcia-Molina
- Decentralized Algorithms using both Local and Random Probes
for P2P Load Balancing
Krishnaram Kenthapadi
and G. S. Manku
- Achieving Stability in Networks of Input-Queued Switches
using a Local Online Scheduling Algorithm
S. U. Nabar
, N. Kumar
, M. Bayati
and A. Keshavarzian
- Security Analysis of Network Protocols: Compositional Reasoning and
Complexity-theoretic Foundations
Anupam Datta
- Tight Bounds for Shared Memory Systems Accessed by Byzantine Processes
Noga Alon
, Michael Merritt
, Omer Reingold
, Gadi Taubenfeld
and Rebecca N. Wright
- Computation in the Wild
Stephanie Forrest
, Justin Balthrop
, Matthew Glickman
and David Ackley
- Stably computable properties of network graphs
Dana Angluin
, James Aspnes
, Melody Chan
, Michael J. Fischer
, Hong Jiang
and Rene Peralta
- Liability in Peer-to-Peer Systems
Chris Riley
- Randomized Instruction Set Emulation
G. Barrantes
, David Ackley
, Stephanie Forrest
and D. Stefanovic
- Inoculation strategies for victims of viruses and the sum-of-squares partition problem
James Aspnes
, Kevin Chang
and Aleksandr Yampolskiy
- Learning-Based Anomaly Detection in BGP Updates
Jian Zhang , Jennifer Rexford and Joan
Feigenbaum
- Typed Computational Email for Serverless Distributed Applications
Robert Fischer
, Hong Jiang
and Michael J. Fischer
- Limited Reputation Sharing in P2P Systems
Sergio Marti
and Hector Garcia-Molina
- SPROUT: P2P Routing with Social Networks
Sergio Marti
, Prasanna Ganesan
and Hector Garcia-Molina
- On the Effectiveness of Address-Space Randomization
Hovav Shacham
, M. Page
, B. Pfaff
, Eu-Jin Goh
, Nagendra Modadugu
and Dan Boneh
- SPROUT: P2P Routing with Social Networks (extended version)
Sergio Marti
, Prasanna Ganesan
and Hector Garcia-Molina
- Resource Discovery in Peer-to-Peer Systems
Beverly Yang
- Online Computations in Scheduling and Network Applications
An Zhu
- Dipsea: A Modular Distributed Hash Table
G. S. Manku
- Randomized ID Selection for Peer to Peer Networks
G. S. Manku
- DHT Routing Using Social Links
Sergio Marti
, Prasanna Ganesan
and Hector Garcia-Molina
- Optimal Routing in Chord
Prasanna Ganesan
and G. S. Manku
- Know thy Neighbor's Neighbor: The Power of Lookahead in Randomized P2P Networks
G. S. Manku
, Moni Naor
and U Wieder
- Technological Networks and the Spread of Computer Viruses
Justin Balthrop
, Stephanie Forrest
, M. Newman
and M. Williamson
- Privacy Preserving Indexing of Documents on the Network
Mayank Bawa
, Roberto Bayardo Jr.
and Rakesh Agrawal
- Java object lifetimes are predictable
H. Hajime
, D. Stefanovic
and Stephanie Forrest
- Autonomous Security for Autonomous Systems
Josh Karlin
, Jennifer Rexfrod
and Stephanie Forrest
- An Integrated Model of Traffic, Geography and Economy in the Internet
Petter Holme
, Josh Karlin
and Stephanie Forrest
- Scaling Theory for Information Networks
Melanie Moses
, Stephanie Forrest
, Al Davis
, Michael Lodder
and James Brown
Back to publications