The Case for Modeling Security, Privacy, Usability and Reliability (SPUR) in Automotive Software | 5 | 0.64 | 2006 |
Impeding attrition attacks in P2P systems | 11 | 0.86 | 2004 |
2 P2P or not 2 P2P? | 18 | 1.86 | 2004 |
Notes On The Design Of An Internet Adversary | 1 | 0.35 | 2004 |
Preserving peer replicas by rate-limited sampled voting | 65 | 6.39 | 2003 |
Preserving Peer Replicas By Rate-Limited Sampled Voting in LOCKSS | 2 | 0.50 | 2003 |
Narses: A Scalable Flow-Based Network Simulator | 22 | 1.57 | 2002 |
Enabling the Long-Term Archival of Signed Documents through Time Stamping | 14 | 1.29 | 2001 |
Mitigating routing misbehavior in mobile ad hoc networks. | 0 | 0.34 | 2000 |