2009 | ||
---|---|---|
54 | Brian Neil Levine, Gerome Miklau: Auditing and Forensic Analysis. Encyclopedia of Database Systems 2009: 172-176 | |
2008 | ||
53 | N. Boris Margolin, Brian Neil Levine: Quantifying Resistance to the Sybil Attack. Financial Cryptography 2008: 1-15 | |
52 | Aruna Balasubramanian, Brian Neil Levine, Arun Venkataramani: Enhancing interactive web applications in hybrid networks. MOBICOM 2008: 70-80 | |
51 | Nilanjan Banerjee, Mark D. Corner, Donald F. Towsley, Brian Neil Levine: Relays, base stations, and meshes: enhancing mobile networks with infrastructure. MOBICOM 2008: 81-91 | |
50 | Aruna Balasubramanian, Ratul Mahajan, Arun Venkataramani, Brian Neil Levine, John Zahorjan: Interactive wifi connectivity for moving vehicles. SIGCOMM 2008: 427-438 | |
49 | Matthew K. Wright, Micah Adler, Brian Neil Levine, Clay Shields: Passive-Logging Attacks Against Anonymous Communications Systems. ACM Trans. Inf. Syst. Secur. 11(2): (2008) | |
48 | Brendan Burns, Oliver Brock, Brian Neil Levine: MORA routing and capacity building in disruption-tolerant networks. Ad Hoc Networks 6(4): 600-620 (2008) | |
2007 | ||
47 | Gerome Miklau, Brian Neil Levine, Patrick Stahlberg: Securing history: Privacy and accountability in database systems. CIDR 2007: 387-396 | |
46 | Aruna Balasubramanian, Yun Zhou, W. Bruce Croft, Brian Neil Levine, Arun Venkataramani: Web search from a bus. Challenged Networks 2007: 59-66 | |
45 | N. Boris Margolin, Brian Neil Levine: Informant: Detecting Sybils Using Incentives. Financial Cryptography 2007: 192-207 | |
44 | Nilanjan Banerjee, Mark D. Corner, Brian Neil Levine: An Energy-Efficient Architecture for DTN Throwboxes. INFOCOM 2007: 776-784 | |
43 | Xiaolan Zhang, Jim Kurose, Brian Neil Levine, Donald F. Towsley, Honggang Zhang: Study of a bus-based disruption-tolerant network: mobility modeling and impact on routing. MOBICOM 2007: 195-206 | |
42 | John Burgess, George Dean Bissias, Mark D. Corner, Brian Neil Levine: Surviving attacks on disruption-tolerant networks without authentication. MobiHoc 2007: 61-70 | |
41 | Aruna Balasubramanian, Brian Neil Levine, Arun Venkataramani: DTN routing as a resource allocation problem. SIGCOMM 2007: 373-384 | |
40 | George Dean Bissias, Brian Neil Levine, Arnold L. Rosenberg: Bounding damage from link destruction, with application to the internet. SIGMETRICS 2007: 367-368 | |
39 | Patrick Stahlberg, Gerome Miklau, Brian Neil Levine: Threats to privacy in the forensic analysis of database systems. SIGMOD Conference 2007: 91-102 | |
38 | Nathaniel E. Baughman, Marc Liberatore, Brian Neil Levine: Cheat-proof playout for centralized and peer-to-peer gaming. IEEE/ACM Trans. Netw. 15(1): 1-13 (2007) | |
2006 | ||
37 | Brian Neil Levine, Mark Claypool: Network and Operating System Support for Digital Audio and Video, 16th International Workshop, NOSSDAV 2006, Newport, Rhode Island, USA, November 22-23, 2006, Proceedings ACM 2006 | |
36 | Marc Liberatore, Brian Neil Levine: Inferring the source of encrypted HTTP connections. ACM Conference on Computer and Communications Security 2006: 255-263 | |
35 | Marc Liberatore, Brian Neil Levine, Chadi Barakat: Maximizing transfer opportunities in bluetooth DTNs. CoNEXT 2006: 3 | |
34 | Brendan Burns, Oliver Brock, Brian Neil Levine: Autonomous Enhancement of Disruption Tolerant Networks. ICRA 2006: 2105-2110 | |
33 | John Burgess, Brian Gallagher, David Jensen, Brian Neil Levine: MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks. INFOCOM 2006 | |
32 | Jim Partan, Jim Kurose, Brian Neil Levine: A survey of practical issues in underwater networks. Underwater Networks 2006: 17-24 | |
31 | Brian Neil Levine, Clay Shields: Internet security. Computer Communications 29(3): 279 (2006) | |
2005 | ||
30 | Matthew Yurkewych, Brian Neil Levine, Arnold L. Rosenberg: On the cost-ineffectiveness of redundancy in commercial P2P computing. ACM Conference on Computer and Communications Security 2005: 280-288 | |
29 | Brendan Burns, Oliver Brock, Brian Neil Levine: MV routing and capacity building in disruption tolerant networks. INFOCOM 2005: 398-408 | |
28 | Andrew Fast, David Jensen, Brian Neil Levine: Creating social networks to improve peer-to-peer networking. KDD 2005: 568-573 | |
27 | Aaron St. John, Brian Neil Levine: Supporting P2P gaming when players have heterogeneous resources. NOSSDAV 2005: 1-6 | |
26 | George Dean Bissias, Marc Liberatore, David Jensen, Brian Neil Levine: Privacy Vulnerabilities in Encrypted HTTP Streams. Privacy Enhancing Technologies 2005: 1-11 | |
25 | Kimaya Sanzgiri, D. LaFlamme, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M. Belding-Royer: Authenticated routing for ad hoc networks. IEEE Journal on Selected Areas in Communications 23(3): 598-610 (2005) | |
2004 | ||
24 | Haizheng Zhang, W. Bruce Croft, Brian Neil Levine, Victor R. Lesser: A Multi-Agent Approach for Peer-to-Peer Based Information Retrieval System. AAMAS 2004: 456-463 | |
23 | N. Boris Margolin, Matthew Wright, Brian Neil Levine: Analysis of an incentives-based secrets protection system. Digital Rights Management Workshop 2004: 22-30 | |
22 | Brian Neil Levine, Michael K. Reiter, Chenxi Wang, Matthew Wright: Timing Attacks in Low-Latency Mix Systems (Extended Abstract). Financial Cryptography 2004: 251-265 | |
21 | Jacky Chu, Kevin Labonte, Brian Neil Levine: An evaluation of chord using traces of peer-to-peer file sharing. SIGMETRICS 2004: 432-433 | |
20 | Matthew Wright, Micah Adler, Brian Neil Levine, Clay Shields: The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Secur. 7(4): 489-522 (2004) | |
2003 | ||
19 | Katrina M. Hanna, Brian Neil Levine, R. Manmatha: Mobile Distributed Information Retrieval for Highly-Partitioned Networks. ICNP 2003: 38- | |
18 | Matthew Wright, Micah Adler, Brian Neil Levine, Clay Shields: Defending Anonymous Communications Against Passive Logging Attack. IEEE Symposium on Security and Privacy 2003: 28- | |
17 | Daniel S. Bernstein, Zhengzhu Feng, Brian Neil Levine, Shlomo Zilberstein: Adaptive Peer Selection. IPTPS 2003: 237-246 | |
16 | Brian Neil Levine, Sanjoy Paul, J. J. Garcia-Luna-Aceves: Organizing multicast receivers deterministically by packet-loss correlation. Multimedia Syst. 9(1): 3-14 (2003) | |
2002 | ||
15 | Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M. Belding-Royer: A Secure Routing Protocol for Ad Hoc Networks. ICNP 2002: 78-89 | |
14 | Matthew Wright, Micah Adler, Brian Neil Levine, Clay Shields: An Analysis of the Degradation of Anonymous Protocols. NDSS 2002 | |
13 | Brian Neil Levine, Clay Shields: Hordes: a Multicast-Based Protocol for Anonymity. Journal of Computer Security 10(3): 213-240 (2002) | |
2001 | ||
12 | V. Scarlata, Brian Neil Levine, Clay Shields: Responder Anonymity and Anonymous Peer-to-Peer File Sharing. ICNP 2001: 272-280 | |
11 | Katrina M. Hanna, Nandini Natarajan, Brian Neil Levine: Evaluation of a Novel Two-Step Server Selection Metric. ICNP 2001: 290-300 | |
10 | Nathaniel E. Baughman, Brian Neil Levine: Cheat-proof Playout for Centralized and Distributed Online Games. INFOCOM 2001: 104-113 | |
9 | James A. Davis, Andrew H. Fagg, Brian Neil Levine: Wearable Computers as Packet Transport Mechanisms in Highly-Partitioned Ad-Hoc Networks. ISWC 2001: 141-148 | |
2000 | ||
8 | Clay Shields, Brian Neil Levine: A protocol for anonymous communication over the Internet. ACM Conference on Computer and Communications Security 2000: 33-42 | |
7 | Brian Neil Levine, Jon Crowcroft, Christophe Diot, J. J. Garcia-Luna-Aceves, James F. Kurose: Consideration of Receiver Interest for IP Multicast Delivery. INFOCOM 2000: 470-479 | |
6 | Joerg Walz, Brian Neil Levine: A hierarchical multicast monitoring scheme. Networked Group Communication 2000: 105-116 | |
1998 | ||
5 | Brian Neil Levine, Sanjoy Paul, J. J. Garcia-Luna-Aceves: Organizing Multicast Receivers Deterministically by Packet-Loss Correlation. ACM Multimedia 1998: 201-210 | |
4 | Brian Neil Levine, J. J. Garcia-Luna-Aceves: A Comparison of Reliable Multicast Protocols. Multimedia Syst. 6(5): 334-348 (1998) | |
1997 | ||
3 | Brian Neil Levine, J. J. Garcia-Luna-Aceves: Improving Internet multicast with routing labels. ICNP 1997: 241-250 | |
1996 | ||
2 | Brian Neil Levine, David B. Lavo, J. J. Garcia-Luna-Aceves: The Case for Reliable Concurrent Multicasting Using Shared Ack Trees. ACM Multimedia 1996: 365-376 | |
1 | Brian Neil Levine, J. J. Garcia-Luna-Aceves: A Comparison of Known Classes of Reliable Multicast Protocols. ICNP 1996: 112- |