Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Eyo: Device-Transparent Personal Storage., , , , , and . USENIX Annual Technical Conference, USENIX Association, (2011)Device transparency: a new model for mobile storage., , , , , and . Operating Systems Review, 44 (1): 5-9 (2010)Sybil-Resistant DHT Routing., , , and . ESORICS, volume 3679 of Lecture Notes in Computer Science, page 305-318. Springer, (2005)SSL Splitting: Securely Serving Data from Untrusted Caches., and . USENIX Security Symposium, USENIX Association, (2003)User-Relative Names for Globally Connected Personal Devices, , , , , and . CoRR, (2006)Alpaca: extensible authorization for distributed services., , , , and . ACM Conference on Computer and Communications Security, page 432-444. ACM, (2007)SSL splitting: Securely serving data from untrusted caches., and . Computer Networks, 48 (5): 763-779 (2005)Persistent Personal Names for Globally Connected Mobile Devices., , , , , and . OSDI, page 233-248. USENIX Association, (2006)Whanau: A Sybil-proof Distributed Hash Table., and . NSDI, page 111-126. USENIX Association, (2010)The Design, Implementation, and Deployment of a System to Transparently Compress Hundreds of Petabytes of Image Files for a File-Storage Service., , , and . CoRR, (2017)