Citation Impact
Citing Papers
Practical Byzantine fault tolerance
1999 Standout
COMET: code offload by migrating execution transparently
2012
Securing distributed systems with information flow control
2008
The Chubby lock service for loosely-coupled distributed systems
2006
TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones
2010 Standout
MulVAL: a logic-based network security analyzer
2005 Standout
Permission re-delegation: attacks and defenses
2011 Standout
End-to-end authorization
2000
The Anatomy of the Grid: Enabling Scalable Virtual Organizations
2001 Standout
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
2010 Standout
People, Places, Things: Web Presence for the Real World
2002
Language-based information-flow security
2003 Standout
Private authentication
2004
A secure group membership protocol
1996
A survey of Web security
1998
Privacy-preserving data mining
2000 Standout
Secrecy types for asymmetric communication
2003
Big Data: A Survey
2014 Standout
Practical byzantine fault tolerance and proactive recovery
2002 Standout
Mobile Augmented Reality Survey: From Where We Are to Where We Go
2017 Standout
An Introduction to RFID Technology
2006 Standout
seL4
2009 Standout
Crowds
1998 Standout
BOAT: A Block-Streaming App Execution Scheme for Lightweight IoT Devices
2018 Standout
Lest we remember
2009 Standout
Automatic creation of SQL Injection and cross-site scripting attacks
2009 Standout
SAFKASI
2000
Terra
2003
Bigtable
2008 Standout
Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions
2011 Standout
Delegation logic
2003
Enabling the Internet of Things
2015 Standout
Xen and the art of virtualization
2003 Standout
A Calculus for Cryptographic Protocols: The Spi Calculus
1999
An architecture for survivable coordination in large distributed systems
2000
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks
2008
A security architecture for fault-tolerant systems
1994
Quire: Lightweight Provenance for Smart Phone Operating Systems
2011
The design and implementation of an operating system to support distributed multimedia applications
1996
Architectural support for copy and tamper resistant software
2000
Works of Edward Wobber being referenced
Authentication in the Taos operating system
1994
Secure Web tunneling
1998
A simple and efficient implementation of a small database
1987
Network objects
1995
Authentication in distributed systems
1992
Authentication in distributed systems
1991
Network objects
1993