Author of the publication

Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.

, , , , , and . ACNS, volume 9092 of Lecture Notes in Computer Science, page 431-453. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scalable Content-aware Request Distribution in Cluster-based Network Servers., , , and . USENIX Annual Technical Conference, General Track, page 323-336. USENIX, (2000)Flash: An efficient and portable Web server., , and . USENIX Annual Technical Conference, General Track, page 199-212. USENIX, (1999)Ostra: Leveraging Trust to Thwart Unwanted Communication., , , and . NSDI, page 15-30. USENIX Association, (2008)Privacy Capsules: Preventing Information Leaks by Mobile Apps., , , and . MobiSys, page 399-411. ACM, (2016)Lazy Receiver Processing (LRP): A Network Subsystem Architecture for Server Systems., and . OSDI, page 261-275. ACM, (1996)Operating Systems Review 30, Special Issue, October 1996.Defending against eclipse attacks on overlay networks., , , and . ACM SIGOPS European Workshop, page 21. ACM, (2004)Topology-Aware Routing in Structured Peer-to-Peer Overlay Networks., , , and . Future Directions in Distributed Computing, volume 2584 of Lecture Notes in Computer Science, page 103-107. Springer, (2003)Scribe: a large-scale and decentralized application-level multicast infrastructure., , , and . IEEE J. Sel. Areas Commun., 20 (8): 1489-1499 (2002)Accountable Virtual Machines., , , and . OSDI, page 119-134. USENIX Association, (2010)You are who you know: inferring user profiles in online social networks, , , and . Proceedings of the third ACM international conference on Web search and data mining, page 251--260. New York, NY, USA, ACM, (2010)