Author of the publication

The Sybil Attack.

. IPTPS, volume 2429 of Lecture Notes in Computer Science, page 251-260. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs., , , and . SIGMETRICS, page 34-43. ACM, (2000)Optimizing File Availability in a Secure Serverless Distributed File System., and . SRDS, page 4-13. IEEE Computer Society, (2001)Paper rating vs. paper ranking.. ACM SIGOPS Oper. Syst. Rev., 43 (2): 117-121 (2009)Paper Rating vs. Paper Ranking.. WOWCS, USENIX Association, (2008)A Large-Scale Study of File-System Contents., and . SIGMETRICS, page 59-70. ACM, (1999)Modeling Replica Placement in a Distributed File System: Narrowing the Gap between Analysis and Simulation., and . ESA, volume 2161 of Lecture Notes in Computer Science, page 356-367. Springer, (2001)The SMART way to migrate replicated stateful services., , , , , and . EuroSys, page 103-115. ACM, (2006)Progress-based regulation of low-importance processes., and . SOSP, page 247-260. ACM, (1999)Operating System Review 33(5).Missive: Fast Application Launch From an Untrusted Buffer Cache., , , and . USENIX ATC, page 145-156. USENIX Association, (2014)Is Remote Host Availability Governed by a Universal Law?. SIGMETRICS Perform. Eval. Rev., 31 (3): 25--29 (December 2003)