Algorand: Scaling byzantine agreements for cryptocurrencies Y Gilad, R Hemo, S Micali, G Vlachos, N Zeldovich Proceedings of the 26th symposium on operating systems principles, 51-68, 2017 | 2021 | 2017 |
CryptDB: Protecting confidentiality with encrypted query processing RA Popa, CMS Redfield, N Zeldovich, H Balakrishnan Proceedings of the twenty-third ACM symposium on operating systems …, 2011 | 1855 | 2011 |
Making information flow explicit in HiStar N Zeldovich, S Boyd-Wickizer, E Kohler, D Mazieres Communications of the ACM 54 (11), 93-101, 2011 | 1074 | 2011 |
An analysis of Linux scalability to many cores S Boyd-Wickizer, AT Clements, Y Mao, A Pesterev, MF Kaashoek, ... 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), 2010 | 570 | 2010 |
Reusable garbled circuits and succinct functional encryption S Goldwasser, Y Kalai, RA Popa, V Vaikuntanathan, N Zeldovich Proceedings of the forty-fifth annual ACM symposium on Theory of computing …, 2013 | 546 | 2013 |
Tactics-based remote execution for mobile computing RK Balan, M Satyanarayanan, SY Park, T Okoshi Proceedings of the 1st international conference on Mobile systems …, 2003 | 537* | 2003 |
An ideal-security protocol for order-preserving encoding RA Popa, FH Li, N Zeldovich 2013 IEEE Symposium on Security and Privacy, 463-477, 2013 | 536 | 2013 |
Relational cloud: A database-as-a-service for the cloud C Curino, EPC Jones, RA Popa, N Malviya, E Wu, S Madden, ... | 531 | 2011 |
Processing analytical queries over encrypted data SL Tu, MF Kaashoek, SR Madden, N Zeldovich Association for Computing Machinery (ACM), 2013 | 505 | 2013 |
Vuvuzela: Scalable private messaging resistant to traffic analysis J Van Den Hooff, D Lazar, M Zaharia, N Zeldovich Proceedings of the 25th Symposium on Operating Systems Principles, 137-152, 2015 | 379 | 2015 |
Securing Distributed Systems with Information Flow Control. N Zeldovich, S Boyd-Wickizer, D Mazieres NSDI 8, 293-308, 2008 | 365 | 2008 |
Using Crash Hoare logic for certifying the FSCQ file system H Chen, D Ziegler, T Chajed, A Chlipala, MF Kaashoek, N Zeldovich Proceedings of the 25th Symposium on Operating Systems Principles, 18-37, 2015 | 336 | 2015 |
How to run turing machines on encrypted data S Goldwasser, YT Kalai, RA Popa, V Vaikuntanathan, N Zeldovich Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013 | 271 | 2013 |
Virtual Appliances for Deploying and Maintaining Software. CP Sapuntzakis, D Brumley, R Chandra, N Zeldovich, J Chow, MS Lam, ... LISA 3, 181-194, 2003 | 268 | 2003 |
Virtual appliance management MSL Lam, CP Sapuntzakis, RUV Chandra, NB Zeldovich, M Rosenblum, ... US Patent 7,890,689, 2011 | 266 | 2011 |
Improving application security with data flow assertions A Yip, X Wang, N Zeldovich, MF Kaashoek Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009 | 259 | 2009 |
The scalable commutativity rule: Designing scalable software for multicore processors AT Clements, MF Kaashoek, N Zeldovich, RT Morris, E Kohler ACM Transactions on Computer Systems (TOCS) 32 (4), 1-47, 2015 | 255 | 2015 |
CryptDB: processing queries on an encrypted database RA Popa, CMS Redfield, N Zeldovich, H Balakrishnan Communications of the ACM 55 (9), 103-111, 2012 | 246 | 2012 |
Linux kernel vulnerabilities: State-of-the-art defenses and open problems H Chen, Y Mao, X Wang, D Zhou, N Zeldovich, MF Kaashoek Proceedings of the Second Asia-Pacific Workshop on Systems, 1-5, 2011 | 227 | 2011 |
Energy management in mobile devices with the Cinder operating system A Roy, SM Rumble, R Stutsman, P Levis, D Mazières, N Zeldovich Proceedings of the sixth conference on Computer systems, 139-152, 2011 | 220* | 2011 |