|
Search the dblp DataBase
Brian Neil Levine:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Haizheng Zhang, W. Bruce Croft, Brian Neil Levine, Victor R. Lesser
A Multi-Agent Approach for Peer-to-Peer Based Information Retrieval System. [Citation Graph (0, 0)][DBLP] AAMAS, 2004, pp:456-463 [Conf]
- Matthew Yurkewych, Brian Neil Levine, Arnold L. Rosenberg
On the cost-ineffectiveness of redundancy in commercial P2P computing. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:280-288 [Conf]
- Clay Shields, Brian Neil Levine
A protocol for anonymous communication over the Internet. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2000, pp:33-42 [Conf]
- Marc Liberatore, Brian Neil Levine
Inferring the source of encrypted HTTP connections. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2006, pp:255-263 [Conf]
- Gerome Miklau, Brian Neil Levine, Patrick Stahlberg
Securing history: Privacy and accountability in database systems. [Citation Graph (0, 0)][DBLP] CIDR, 2007, pp:387-396 [Conf]
- N. Boris Margolin, Matthew Wright, Brian Neil Levine
Analysis of an incentives-based secrets protection system. [Citation Graph (0, 0)][DBLP] Digital Rights Management Workshop, 2004, pp:22-30 [Conf]
- Brian Neil Levine, Michael K. Reiter, Chenxi Wang, Matthew Wright
Timing Attacks in Low-Latency Mix Systems (Extended Abstract). [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2004, pp:251-265 [Conf]
- Katrina M. Hanna, Brian Neil Levine, R. Manmatha
Mobile Distributed Information Retrieval for Highly-Partitioned Networks. [Citation Graph (0, 0)][DBLP] ICNP, 2003, pp:38-0 [Conf]
- Katrina M. Hanna, Nandini Natarajan, Brian Neil Levine
Evaluation of a Novel Two-Step Server Selection Metric. [Citation Graph (0, 0)][DBLP] ICNP, 2001, pp:290-300 [Conf]
- Brian Neil Levine, J. J. Garcia-Luna-Aceves
A Comparison of Known Classes of Reliable Multicast Protocols. [Citation Graph (0, 0)][DBLP] ICNP, 1996, pp:112-0 [Conf]
- Brian Neil Levine, J. J. Garcia-Luna-Aceves
Improving Internet multicast with routing labels. [Citation Graph (0, 0)][DBLP] ICNP, 1997, pp:241-250 [Conf]
- V. Scarlata, Brian Neil Levine, Clay Shields
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. [Citation Graph (0, 0)][DBLP] ICNP, 2001, pp:272-280 [Conf]
- Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M. Belding-Royer
A Secure Routing Protocol for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] ICNP, 2002, pp:78-89 [Conf]
- Nathaniel E. Baughman, Brian Neil Levine
Cheat-proof Playout for Centralized and Distributed Online Games. [Citation Graph (0, 0)][DBLP] INFOCOM, 2001, pp:104-113 [Conf]
- Brendan Burns, Oliver Brock, Brian Neil Levine
MV routing and capacity building in disruption tolerant networks. [Citation Graph (0, 0)][DBLP] INFOCOM, 2005, pp:398-408 [Conf]
- Brian Neil Levine, Jon Crowcroft, Christophe Diot, J. J. Garcia-Luna-Aceves, James F. Kurose
Consideration of Receiver Interest for IP Multicast Delivery. [Citation Graph (0, 0)][DBLP] INFOCOM, 2000, pp:470-479 [Conf]
- Daniel S. Bernstein, Zhengzhu Feng, Brian Neil Levine, Shlomo Zilberstein
Adaptive Peer Selection. [Citation Graph (0, 0)][DBLP] IPTPS, 2003, pp:237-246 [Conf]
- James A. Davis, Andrew H. Fagg, Brian Neil Levine
Wearable Computers as Packet Transport Mechanisms in Highly-Partitioned Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP] ISWC, 2001, pp:141-148 [Conf]
- Andrew Fast, David Jensen, Brian Neil Levine
Creating social networks to improve peer-to-peer networking. [Citation Graph (0, 0)][DBLP] KDD, 2005, pp:568-573 [Conf]
- Brian Neil Levine, David B. Lavo, J. J. Garcia-Luna-Aceves
The Case for Reliable Concurrent Multicasting Using Shared Ack Trees. [Citation Graph (0, 0)][DBLP] ACM Multimedia, 1996, pp:365-376 [Conf]
- Brian Neil Levine, Sanjoy Paul, J. J. Garcia-Luna-Aceves
Organizing Multicast Receivers Deterministically by Packet-Loss Correlation. [Citation Graph (0, 0)][DBLP] ACM Multimedia, 1998, pp:201-210 [Conf]
- Matthew Wright, Micah Adler, Brian Neil Levine, Clay Shields
An Analysis of the Degradation of Anonymous Protocols. [Citation Graph (0, 0)][DBLP] NDSS, 2002, pp:- [Conf]
- Joerg Walz, Brian Neil Levine
A hierarchical multicast monitoring scheme. [Citation Graph (0, 0)][DBLP] Networked Group Communication, 2000, pp:105-116 [Conf]
- Aaron St. John, Brian Neil Levine
Supporting P2P gaming when players have heterogeneous resources. [Citation Graph (0, 0)][DBLP] NOSSDAV, 2005, pp:1-6 [Conf]
- George Dean Bissias, Marc Liberatore, David Jensen, Brian Neil Levine
Privacy Vulnerabilities in Encrypted HTTP Streams. [Citation Graph (0, 0)][DBLP] Privacy Enhancing Technologies, 2005, pp:1-11 [Conf]
- Jacky Chu, Kevin Labonte, Brian Neil Levine
An evaluation of chord using traces of peer-to-peer file sharing. [Citation Graph (0, 0)][DBLP] SIGMETRICS, 2004, pp:432-433 [Conf]
- Matthew Wright, Micah Adler, Brian Neil Levine, Clay Shields
Defending Anonymous Communications Against Passive Logging Attack. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:28-0 [Conf]
- Brian Neil Levine, Clay Shields
Internet security. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:3, pp:279- [Journal]
- Brian Neil Levine, Clay Shields
Hordes: a Multicast-Based Protocol for Anonymity. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2002, v:10, n:3, pp:213-240 [Journal]
- Brian Neil Levine, J. J. Garcia-Luna-Aceves
A Comparison of Reliable Multicast Protocols. [Citation Graph (0, 0)][DBLP] Multimedia Syst., 1998, v:6, n:5, pp:334-348 [Journal]
- Brian Neil Levine, Sanjoy Paul, J. J. Garcia-Luna-Aceves
Organizing multicast receivers deterministically by packet-loss correlation. [Citation Graph (0, 0)][DBLP] Multimedia Syst., 2003, v:9, n:1, pp:3-14 [Journal]
- Matthew Wright, Micah Adler, Brian Neil Levine, Clay Shields
The predecessor attack: An analysis of a threat to anonymous communications systems. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:4, pp:489-522 [Journal]
- Nilanjan Banerjee, Mark D. Corner, Brian Neil Levine
An Energy-Efficient Architecture for DTN Throwboxes. [Citation Graph (0, 0)][DBLP] INFOCOM, 2007, pp:776-784 [Conf]
- John Burgess, Brian Gallagher, David Jensen, Brian Neil Levine
MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks. [Citation Graph (0, 0)][DBLP] INFOCOM, 2006, pp:- [Conf]
- Aruna Balasubramanian, Brian Levine, Arun Venkataramani
DTN routing as a resource allocation problem. [Citation Graph (0, 0)][DBLP] SIGCOMM, 2007, pp:373-384 [Conf]
- George Dean Bissias, Brian Neil Levine, Arnold L. Rosenberg
Bounding damage from link destruction, with application to the internet. [Citation Graph (0, 0)][DBLP] SIGMETRICS, 2007, pp:367-368 [Conf]
- Patrick Stahlberg, Gerome Miklau, Brian Neil Levine
Threats to privacy in the forensic analysis of database systems. [Citation Graph (0, 0)][DBLP] SIGMOD Conference, 2007, pp:91-102 [Conf]
- Nathaniel E. Baughman, Marc Liberatore, Brian Neil Levine
Cheat-proof playout for centralized and peer-to-peer gaming. [Citation Graph (0, 0)][DBLP] IEEE/ACM Trans. Netw., 2007, v:15, n:1, pp:1-13 [Journal]
Informant: Detecting Sybils Using Incentives. [Citation Graph (, )][DBLP]
Quantifying Resistance to the Sybil Attack. [Citation Graph (, )][DBLP]
Autonomous Enhancement of Disruption Tolerant Networks. [Citation Graph (, )][DBLP]
Study of a bus-based disruption-tolerant network: mobility modeling and impact on routing. [Citation Graph (, )][DBLP]
A survey of practical issues in underwater networks. [Citation Graph (, )][DBLP]
Relays, base stations, and meshes: enhancing mobile networks with infrastructure. [Citation Graph (, )][DBLP]
Web search from a bus. [Citation Graph (, )][DBLP]
Enhancing interactive web applications in hybrid networks. [Citation Graph (, )][DBLP]
Surviving attacks on disruption-tolerant networks without authentication. [Citation Graph (, )][DBLP]
Interactive wifi connectivity for moving vehicles. [Citation Graph (, )][DBLP]
Maximizing transfer opportunities in bluetooth DTNs. [Citation Graph (, )][DBLP]
MORA routing and capacity building in disruption-tolerant networks. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.006secs
|