Author of the publication

Fighting peer-to-peer SPAM and decoys with object reputation.

, and . P2PECON@SIGCOMM, page 138-143. ACM, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Peer-to-Peer Authentication with a Distributed Single Sign-On Service., , and . IPTPS, volume 3279 of Lecture Notes in Computer Science, page 250-258. Springer, (2004)Short Paper: Service-Oriented Sharding for Blockchains., , and . Financial Cryptography, volume 10322 of Lecture Notes in Computer Science, page 393-401. Springer, (2017)Enabling Strong Database Integrity using Trusted Execution Environments., , and . CoRR, (2018)AntFarm: Efficient Content Distribution with Managed Swarms., and . NSDI, page 107-122. USENIX Association, (2009)SoK: A Classification Framework for Stablecoin Designs., , and . Financial Cryptography, volume 12059 of Lecture Notes in Computer Science, page 174-197. Springer, (2020)Device Driver Safety Through a Reference Validation Mechanism., , , , and . OSDI, page 241-254. USENIX Association, (2008)Efficient Verifiable Secret Sharing with Share Recovery in BFT Protocols., , , , , and . ACM Conference on Computer and Communications Security, page 2387-2402. ACM, (2019)ClosestNode.com: an open access, scalable, shared geocast service for distributed systems., and . ACM SIGOPS Oper. Syst. Rev., 40 (1): 62-64 (2006)An access control language for web services., and . SACMAT, page 23-30. ACM, (2002)A content propagation metric for efficient content distribution., , and . SIGCOMM, page 326-337. ACM, (2011)