Sybil-resistant DHT routing G Danezis, C Lesniewski-Laas, MF Kaashoek, R Anderson European Symposium On Research In Computer Security, 305-318, 2005 | 209 | 2005 |
Whanau: A sybil-proof distributed hash table C Lesniewski-Laas, MF Kaashoek USENIX Association, 2010 | 158 | 2010 |
Persistent personal names for globally connected mobile devices B Ford, J Strauss, C Lesniewski-Laas, S Rhea, F Kaashoek, R Morris Proceedings of the 7th symposium on Operating systems design and …, 2006 | 147 | 2006 |
A Sybil-proof one-hop DHT C Lesniewski-Laas Proceedings of the 1st workshop on Social network systems, 19-24, 2008 | 61 | 2008 |
Alpaca: extensible authorization for distributed services C Lesniewski-Laas, B Ford, J Strauss, R Morris, MF Kaashoek Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 54 | 2007 |
SSL splitting: Securely serving data from untrusted caches C Lesniewski-Laas, MF Kaashoek Computer Networks 48 (5), 763-779, 2005 | 53 | 2005 |
Eyo: Device-Transparent Personal Storage. J Strauss, JM Paluska, C Lesniewski-Laas, B Ford, RT Morris, ... USENIX Annual Technical Conference, 2011 | 36 | 2011 |
Device transparency: a new model for mobile storage J Strauss, C Lesniewski-Laas, JM Paluska, B Ford, R Morris, F Kaashoek ACM SIGOPS Operating Systems Review 44 (1), 5-9, 2010 | 25 | 2010 |
User-relative names for globally connected personal devices B Ford, J Strauss, C Lesniewski-Laas, S Rhea, F Kaashoek, R Morris arXiv preprint cs/0603076, 2006 | 22 | 2006 |
The design, implementation, and deployment of a system to transparently compress hundreds of petabytes of image files for a file-storage service DR Horn, K Elkabany, C Lesniewski-Lass, K Winstein 14th {USENIX} Symposium on Networked Systems Design and Implementation …, 2017 | 10 | 2017 |
Design and applications of a secure and decentralized distributed hash table CT Lesniewski-Laas Massachusetts Institute of Technology, 2011 | 7 | 2011 |
Alpaca, a proof-carrying authentication framework for cryptographic primitives and protocols C Lesniewski-Laas, B Ford, J Strauss, R Morris, MF Kaashoek Proceedings of the 14th ACM Conference on Computer and Communications Security, 2007 | 5 | 2007 |
Device-transparent personal storage. JA Strauss, JM Paluska, C Lesniewski-Laas, B Ford, R Morris, ... Massachusetts Institute of Technology, Department of Electrical Engineering …, 2010 | 3 | 2010 |
Whanaungatanga: Sybil-proof routing with social networks C Lesniewski-Laas, MF Kaashoek | 1 | 2009 |
Ssl splitting and barnraising: Cooperative caching with authenticity guarantees CT Lesniewski-Laas Massachusetts Institute of Technology, 2003 | 1 | 2003 |
The Design, Implementation, and Deployment of a System to Transparently Compress Hundreds of Petabytes of Image Files for a File-Storage Service D Reiter Horn, K Elkabany, C Lesniewski-Laas, K Winstein arXiv, arXiv: 1704.06192, 2017 | | 2017 |
Tag Database Performance D Glasser, C Lesniewski-Laas, R Tibbetts | | 2006 |
UIA: a user information architecture for personal devices B Ford, J Strauss, C Lesniewski-Laas, F Kaashoek, R Morris, S Rhea Proceedings of the twentieth ACM symposium on Operating systems principles, 1-2, 2005 | | 2005 |
First-Class Modules for Perl R Tibbetts, C Lesniewski-Laas | | 2002 |
The Design and Construction of a Robotic Escherichia coli C Lesniewski-Laas | | 2002 |