Volgen
Michael Walfish
Michael Walfish
Professor of Computer Science, NYU
Geverifieerd e-mailadres voor cs.nyu.edu
Titel
Geciteerd door
Geciteerd door
Jaar
A layered naming architecture for the internet
H Balakrishnan, K Lakshminarayanan, S Ratnasamy, S Shenker, I Stoica, ...
ACM SIGCOMM Computer Communication Review 34 (4), 343-352, 2004
4682004
Depot: Cloud storage with minimal trust
P Mahajan, S Setty, S Lee, A Clement, L Alvisi, M Dahlin, M Walfish
ACM Transactions on Computer Systems (TOCS) 29 (4), 1-38, 2011
4302011
Untangling the Web from DNS.
M Walfish, H Balakrishnan, S Shenker
NSDI 4, 17-17, 2004
3892004
Doubly-efficient zkSNARKs without trusted setup
RS Wahby, I Tzialla, A Shelat, J Thaler, M Walfish
2018 IEEE Symposium on Security and Privacy (SP), 926-943, 2018
3612018
DDoS defense by offense
M Walfish, M Vutukuru, H Balakrishnan, D Karger, S Shenker
Proceedings of the 2006 conference on Applications, technologies …, 2006
3142006
Middleboxes No Longer Considered Harmful.
M Walfish, J Stribling, MN Krohn, H Balakrishnan, RT Morris, S Shenker
OSDI 4, 15-15, 2004
2692004
Verifying computations without reexecuting them: from theoretical possibility to near-practicality
M Walfish, A Blumberg
Electronic Colloquium on Computational Complexity, 2013
268*2013
Verifying computations with state
B Braun, AJ Feldman, Z Ren, S Setty, AJ Blumberg, M Walfish
Proceedings of the twenty-fourth ACM Symposium on Operating Systems …, 2013
2452013
Efficient RAM and control flow in verifiable outsourced computation
RS Wahby, S Setty, M Howald, Z Ren, AJ Blumberg, M Walfish
Cryptology ePrint Archive, 2014
2282014
Taking {Proof-Based} verified computation a few steps closer to practicality
S Setty, V Vu, N Panpalia, B Braun, AJ Blumberg, M Walfish
21st USENIX Security Symposium (USENIX Security 12), 253-268, 2012
2262012
Making argument systems for outsourced computation practical (sometimes).
STV Setty, R McPherson, AJ Blumberg, M Walfish
NDSS 1 (9), 17, 2012
2182012
A hybrid architecture for interactive verifiable computation
V Vu, S Setty, AJ Blumberg, M Walfish
2013 IEEE Symposium on Security and Privacy, 223-237, 2013
1992013
Verifying and enforcing network paths with ICING
J Naous, M Walfish, A Nicolosi, D Mazieres, M Miller, A Seehra
Proceedings of the Seventh Conference on Emerging Networking Experiments and …, 2011
1862011
Resolving the conflict between generality and plausibility in verified computation
S Setty, B Braun, V Vu, AJ Blumberg, B Parno, M Walfish
Proceedings of the 8th ACM European Conference on Computer Systems, 71-84, 2013
1742013
{DJoin}: Differentially private join queries over distributed databases
A Narayan, A Haeberlen
10th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2012
1662012
Detecting failures in distributed systems with the falcon spy network
JB Leners, H Wu, WL Hung, MK Aguilera, M Walfish
Proceedings of the Twenty-Third ACM Symposium on Operating Systems …, 2011
1552011
Scalable and private media consumption with Popcorn
T Gupta, N Crooks, W Mulhern, S Setty, L Alvisi, M Walfish
13th USENIX symposium on networked systems design and implementation (NSDI …, 2016
1292016
Full accounting for verifiable outsourcing
RS Wahby, Y Ji, AJ Blumberg, A Shelat, J Thaler, M Walfish, T Wies
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
962017
DDoS defense by offense
M Walfish, M Vutukuru, H Balakrishnan, D Karger, S Shenker
ACM Transactions on Computer Systems (TOCS) 28 (1), 3, 2010
902010
The nebula future internet architecture
T Anderson, K Birman, R Broberg, M Caesar, D Comer, C Cotton, ...
The Future Internet: Future Internet Assembly 2013: Validated Results and …, 2013
892013
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20