Active Bibliography

Algorithmic Attacks and Timing Leaks in Distributed Systems – Scott A. Crosby, Scott A. Crosby - 2005
USENIX Association Proceedings of the – Scott A. Crosby, Dan S. Wallach - 2003
544 A Framework for Dynamic Graph Drawing – Robert F. Cohen, G. Di Battista, R. Tamassia, Ioannis G. Tollis - 1992
692 Query evaluation techniques for large databases – Goetz Graefe - 1993
762 Summary cache: A scalable wide-area web cache sharing protocol – Li Fan, Pei Cao, Jussara Almeida, Andrei Z. Broder - 1998
512 Overcast: Reliable Multicasting with an Overlay Network – John Jannotti, David K. Gifford, Kirk L. Johnson, M. Frans Kaashoek, James W. O'Toole, Jr., M. Frans, Kaashoek James - 2000
860 Tor: The Second-Generation Onion Router – Roger Dingledine, Nick Mathewson, Paul Syverson - 2004
977 Linearizability: a correctness condition for concurrent objects – Maurice P. Herlihy, Jeannette M. Wing - 1990
505 Secure Routing for Mobile Ad Hoc Networks – Panagiotis Papadimitratos, Zygmunt Haas - 2002