A layered naming architecture for the internet H Balakrishnan, K Lakshminarayanan, S Ratnasamy, S Shenker, I Stoica, ... ACM SIGCOMM Computer Communication Review 34 (4), 343-352, 2004 | 467 | 2004 |
Depot: Cloud storage with minimal trust P Mahajan, S Setty, S Lee, A Clement, L Alvisi, M Dahlin, M Walfish ACM Transactions on Computer Systems (TOCS) 29 (4), 1-38, 2011 | 428 | 2011 |
Untangling the Web from DNS. M Walfish, H Balakrishnan, S Shenker NSDI 4, 17-17, 2004 | 388 | 2004 |
Doubly-efficient zkSNARKs without trusted setup RS Wahby, I Tzialla, A Shelat, J Thaler, M Walfish 2018 IEEE Symposium on Security and Privacy (SP), 926-943, 2018 | 348 | 2018 |
DDoS defense by offense M Walfish, M Vutukuru, H Balakrishnan, D Karger, S Shenker Proceedings of the 2006 conference on Applications, technologies …, 2006 | 313 | 2006 |
Middleboxes No Longer Considered Harmful. M Walfish, J Stribling, MN Krohn, H Balakrishnan, RT Morris, S Shenker OSDI 4, 15-15, 2004 | 269 | 2004 |
Verifying computations without reexecuting them: from theoretical possibility to near-practicality M Walfish, A Blumberg Electronic Colloquium on Computational Complexity, 2013 | 265* | 2013 |
Verifying computations with state B Braun, AJ Feldman, Z Ren, S Setty, AJ Blumberg, M Walfish Proceedings of the twenty-fourth ACM Symposium on Operating Systems …, 2013 | 242 | 2013 |
Efficient RAM and control flow in verifiable outsourced computation RS Wahby, S Setty, M Howald, Z Ren, AJ Blumberg, M Walfish Cryptology ePrint Archive, 2014 | 226 | 2014 |
Taking {Proof-Based} verified computation a few steps closer to practicality S Setty, V Vu, N Panpalia, B Braun, AJ Blumberg, M Walfish 21st USENIX Security Symposium (USENIX Security 12), 253-268, 2012 | 223 | 2012 |
Making argument systems for outsourced computation practical (sometimes). STV Setty, R McPherson, AJ Blumberg, M Walfish NDSS 1 (9), 17, 2012 | 218 | 2012 |
A hybrid architecture for interactive verifiable computation V Vu, S Setty, AJ Blumberg, M Walfish 2013 IEEE Symposium on Security and Privacy, 223-237, 2013 | 197 | 2013 |
Verifying and enforcing network paths with ICING J Naous, M Walfish, A Nicolosi, D Mazieres, M Miller, A Seehra Proceedings of the Seventh Conference on Emerging Networking Experiments and …, 2011 | 185 | 2011 |
Resolving the conflict between generality and plausibility in verified computation S Setty, B Braun, V Vu, AJ Blumberg, B Parno, M Walfish Proceedings of the 8th ACM European Conference on Computer Systems, 71-84, 2013 | 172 | 2013 |
{DJoin}: Differentially private join queries over distributed databases A Narayan, A Haeberlen 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2012 | 164 | 2012 |
Detecting failures in distributed systems with the falcon spy network JB Leners, H Wu, WL Hung, MK Aguilera, M Walfish Proceedings of the Twenty-Third ACM Symposium on Operating Systems …, 2011 | 153 | 2011 |
Scalable and private media consumption with Popcorn T Gupta, N Crooks, W Mulhern, S Setty, L Alvisi, M Walfish 13th USENIX symposium on networked systems design and implementation (NSDI …, 2016 | 127 | 2016 |
Full accounting for verifiable outsourcing RS Wahby, Y Ji, AJ Blumberg, A Shelat, J Thaler, M Walfish, T Wies Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 94 | 2017 |
DDoS defense by offense M Walfish, M Vutukuru, H Balakrishnan, D Karger, S Shenker ACM Transactions on Computer Systems (TOCS) 28 (1), 3, 2010 | 90 | 2010 |
The nebula future internet architecture T Anderson, K Birman, R Broberg, M Caesar, D Comer, C Cotton, ... The Future Internet: Future Internet Assembly 2013: Validated Results and …, 2013 | 88 | 2013 |