Sybil-resistant DHT routing G Danezis, C Lesniewski-Laas, MF Kaashoek, R Anderson Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005 | 230 | 2005 |
Whanau: A sybil-proof distributed hash table C Lesniewski-Laas, MF Kaashoek USENIX Association, 2010 | 167 | 2010 |
Persistent personal names for globally connected mobile devices B Ford, J Strauss, C Lesniewski-Laas, S Rhea, F Kaashoek, R Morris Proceedings of the 7th symposium on Operating systems design and …, 2006 | 161 | 2006 |
A Sybil-proof one-hop DHT C Lesniewski-Laas Proceedings of the 1st workshop on Social network systems, 19-24, 2008 | 65 | 2008 |
{SSL} Splitting: Securely Serving Data from Untrusted Caches C Lesniewski-Laas, MF Kaashoek 12th USENIX Security Symposium (USENIX Security 03), 2003 | 61 | 2003 |
Alpaca: extensible authorization for distributed services C Lesniewski-Laas, B Ford, J Strauss, R Morris, MF Kaashoek Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 55 | 2007 |
Eyo:{Device-Transparent} Personal Storage J Strauss, JM Paluska, C Lesniewski-Laas, B Ford, R Morris, F Kaashoek 2011 USENIX Annual Technical Conference (USENIX ATC 11), 2011 | 45 | 2011 |
Device transparency: a new model for mobile storage J Strauss, C Lesniewski-Laas, JM Paluska, B Ford, R Morris, F Kaashoek ACM SIGOPS Operating Systems Review 44 (1), 5-9, 2010 | 33 | 2010 |
User-relative names for globally connected personal devices B Ford, J Strauss, C Lesniewski-Laas, S Rhea, F Kaashoek, R Morris arXiv preprint cs/0603076, 2006 | 25 | 2006 |
The design, implementation, and deployment of a system to transparently compress hundreds of petabytes of image files for a {File-Storage} service DR Horn, K Elkabany, C Lesniewski-Lass, K Winstein 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2017 | 24 | 2017 |
Device-transparent personal storage. J Strauss, JM Paluska, C Lesniewski-Laas, B Ford, R Morris, F Kaashoek Massachusetts Institute of Technology, Department of Electrical Engineering …, 2010 | 9 | 2010 |
Design and applications of a secure and decentralized distributed hash table CT Lesniewski-Laas Massachusetts Institute of Technology, 2011 | 7 | 2011 |
Alpaca, a proof-carrying authentication framework for cryptographic primitives and protocols C Lesniewski-Laas, B Ford, J Strauss, R Morris, MF Kaashoek Proceedings of the 14th ACM Conference on Computer and Communications Security, 2007 | 5 | 2007 |
Whanaungatanga: Sybil-proof routing with social networks C Lesniewski-Laas, MF Kaashoek | 1 | 2009 |
Ssl splitting and barnraising: Cooperative caching with authenticity guarantees CT Lesniewski-Laas Massachusetts Institute of Technology, 2003 | 1 | 2003 |
Eyo: An {Application-Oriented} Personal Data Synchronizer J Strauss, C Lesniewski-Laas, B Ford, R Morris, F Kaashoek | | 2008 |
Tag Database Performance D Glasser, C Lesniewski-Laas, R Tibbetts | | 2006 |
UIA: a user information architecture for personal devices B Ford, J Strauss, C Lesniewski-Laas, F Kaashoek, R Morris, S Rhea Proceedings of the twentieth ACM symposium on Operating systems principles, 1-2, 2005 | | 2005 |
First-Class Modules for Perl R Tibbetts, C Lesniewski-Laas | | 2002 |
The Design and Construction of a Robotic Escherichia coli C Lesniewski-Laas | | 2002 |