Publications
Current Filters
Clear all
Publication | Type | Year |
---|---|---|
Anti-persistence on persistent storage: history-independent sparse tables and dictionariesACM Principles of Database Systems |
Conference Paper – 2016 Conference Paper | 2016 |
Social-Media Network Collection ProblemsWorkshop on Incomplete Network Data |
Conference Paper – 2016 Conference Paper | 2016 |
TWIAD the Write-Optimized IP Address DatabaseBadgers 2015 |
Conference Paper – 2016 Conference Paper | 2016 |
Track Network Events with Write Optimized Data StructuresBADGERS 2015 workshop on building analysis datasets and gathering experience for returns on security |
Conference Paper – 2015 Conference Paper | 2015 |
Secure Distributed Membership Tests via Secret Sharing How to Hide Your Hostile Hosts: Harnessing Shamir Secret SharingInternational Conference on Computing, Networking and Communications |
Conference Paper – 2015 Conference Paper | 2015 |
Secure Distributed Set Membership through Secret SharingCis Erb |
Display or Poster (non-conference) – 2015 Display or Poster (non-conference) | 2015 |
Investigating the Effectiveness of Many-core Network Processors for High Performance Cyber Protection Systems (PART I - FY2011) |
SAND Report – 2011 SAND Report | 2011 |
Document Title | Type | Year |