The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Brian Neil Levine: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Haizheng Zhang, W. Bruce Croft, Brian Neil Levine, Victor R. Lesser
    A Multi-Agent Approach for Peer-to-Peer Based Information Retrieval System. [Citation Graph (0, 0)][DBLP]
    AAMAS, 2004, pp:456-463 [Conf]
  2. Matthew Yurkewych, Brian Neil Levine, Arnold L. Rosenberg
    On the cost-ineffectiveness of redundancy in commercial P2P computing. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:280-288 [Conf]
  3. Clay Shields, Brian Neil Levine
    A protocol for anonymous communication over the Internet. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:33-42 [Conf]
  4. Marc Liberatore, Brian Neil Levine
    Inferring the source of encrypted HTTP connections. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:255-263 [Conf]
  5. Gerome Miklau, Brian Neil Levine, Patrick Stahlberg
    Securing history: Privacy and accountability in database systems. [Citation Graph (0, 0)][DBLP]
    CIDR, 2007, pp:387-396 [Conf]
  6. N. Boris Margolin, Matthew Wright, Brian Neil Levine
    Analysis of an incentives-based secrets protection system. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2004, pp:22-30 [Conf]
  7. Brian Neil Levine, Michael K. Reiter, Chenxi Wang, Matthew Wright
    Timing Attacks in Low-Latency Mix Systems (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:251-265 [Conf]
  8. Katrina M. Hanna, Brian Neil Levine, R. Manmatha
    Mobile Distributed Information Retrieval for Highly-Partitioned Networks. [Citation Graph (0, 0)][DBLP]
    ICNP, 2003, pp:38-0 [Conf]
  9. Katrina M. Hanna, Nandini Natarajan, Brian Neil Levine
    Evaluation of a Novel Two-Step Server Selection Metric. [Citation Graph (0, 0)][DBLP]
    ICNP, 2001, pp:290-300 [Conf]
  10. Brian Neil Levine, J. J. Garcia-Luna-Aceves
    A Comparison of Known Classes of Reliable Multicast Protocols. [Citation Graph (0, 0)][DBLP]
    ICNP, 1996, pp:112-0 [Conf]
  11. Brian Neil Levine, J. J. Garcia-Luna-Aceves
    Improving Internet multicast with routing labels. [Citation Graph (0, 0)][DBLP]
    ICNP, 1997, pp:241-250 [Conf]
  12. V. Scarlata, Brian Neil Levine, Clay Shields
    Responder Anonymity and Anonymous Peer-to-Peer File Sharing. [Citation Graph (0, 0)][DBLP]
    ICNP, 2001, pp:272-280 [Conf]
  13. Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M. Belding-Royer
    A Secure Routing Protocol for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICNP, 2002, pp:78-89 [Conf]
  14. Nathaniel E. Baughman, Brian Neil Levine
    Cheat-proof Playout for Centralized and Distributed Online Games. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2001, pp:104-113 [Conf]
  15. Brendan Burns, Oliver Brock, Brian Neil Levine
    MV routing and capacity building in disruption tolerant networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:398-408 [Conf]
  16. Brian Neil Levine, Jon Crowcroft, Christophe Diot, J. J. Garcia-Luna-Aceves, James F. Kurose
    Consideration of Receiver Interest for IP Multicast Delivery. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2000, pp:470-479 [Conf]
  17. Daniel S. Bernstein, Zhengzhu Feng, Brian Neil Levine, Shlomo Zilberstein
    Adaptive Peer Selection. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2003, pp:237-246 [Conf]
  18. James A. Davis, Andrew H. Fagg, Brian Neil Levine
    Wearable Computers as Packet Transport Mechanisms in Highly-Partitioned Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ISWC, 2001, pp:141-148 [Conf]
  19. Andrew Fast, David Jensen, Brian Neil Levine
    Creating social networks to improve peer-to-peer networking. [Citation Graph (0, 0)][DBLP]
    KDD, 2005, pp:568-573 [Conf]
  20. Brian Neil Levine, David B. Lavo, J. J. Garcia-Luna-Aceves
    The Case for Reliable Concurrent Multicasting Using Shared Ack Trees. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 1996, pp:365-376 [Conf]
  21. Brian Neil Levine, Sanjoy Paul, J. J. Garcia-Luna-Aceves
    Organizing Multicast Receivers Deterministically by Packet-Loss Correlation. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 1998, pp:201-210 [Conf]
  22. Matthew Wright, Micah Adler, Brian Neil Levine, Clay Shields
    An Analysis of the Degradation of Anonymous Protocols. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  23. Joerg Walz, Brian Neil Levine
    A hierarchical multicast monitoring scheme. [Citation Graph (0, 0)][DBLP]
    Networked Group Communication, 2000, pp:105-116 [Conf]
  24. Aaron St. John, Brian Neil Levine
    Supporting P2P gaming when players have heterogeneous resources. [Citation Graph (0, 0)][DBLP]
    NOSSDAV, 2005, pp:1-6 [Conf]
  25. George Dean Bissias, Marc Liberatore, David Jensen, Brian Neil Levine
    Privacy Vulnerabilities in Encrypted HTTP Streams. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2005, pp:1-11 [Conf]
  26. Jacky Chu, Kevin Labonte, Brian Neil Levine
    An evaluation of chord using traces of peer-to-peer file sharing. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2004, pp:432-433 [Conf]
  27. Matthew Wright, Micah Adler, Brian Neil Levine, Clay Shields
    Defending Anonymous Communications Against Passive Logging Attack. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:28-0 [Conf]
  28. Brian Neil Levine, Clay Shields
    Internet security. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:3, pp:279- [Journal]
  29. Brian Neil Levine, Clay Shields
    Hordes: a Multicast-Based Protocol for Anonymity. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2002, v:10, n:3, pp:213-240 [Journal]
  30. Brian Neil Levine, J. J. Garcia-Luna-Aceves
    A Comparison of Reliable Multicast Protocols. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 1998, v:6, n:5, pp:334-348 [Journal]
  31. Brian Neil Levine, Sanjoy Paul, J. J. Garcia-Luna-Aceves
    Organizing multicast receivers deterministically by packet-loss correlation. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2003, v:9, n:1, pp:3-14 [Journal]
  32. Matthew Wright, Micah Adler, Brian Neil Levine, Clay Shields
    The predecessor attack: An analysis of a threat to anonymous communications systems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:4, pp:489-522 [Journal]
  33. Nilanjan Banerjee, Mark D. Corner, Brian Neil Levine
    An Energy-Efficient Architecture for DTN Throwboxes. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:776-784 [Conf]
  34. John Burgess, Brian Gallagher, David Jensen, Brian Neil Levine
    MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]
  35. Aruna Balasubramanian, Brian Levine, Arun Venkataramani
    DTN routing as a resource allocation problem. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2007, pp:373-384 [Conf]
  36. George Dean Bissias, Brian Neil Levine, Arnold L. Rosenberg
    Bounding damage from link destruction, with application to the internet. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2007, pp:367-368 [Conf]
  37. Patrick Stahlberg, Gerome Miklau, Brian Neil Levine
    Threats to privacy in the forensic analysis of database systems. [Citation Graph (0, 0)][DBLP]
    SIGMOD Conference, 2007, pp:91-102 [Conf]
  38. Nathaniel E. Baughman, Marc Liberatore, Brian Neil Levine
    Cheat-proof playout for centralized and peer-to-peer gaming. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2007, v:15, n:1, pp:1-13 [Journal]

  39. Informant: Detecting Sybils Using Incentives. [Citation Graph (, )][DBLP]


  40. Quantifying Resistance to the Sybil Attack. [Citation Graph (, )][DBLP]


  41. Autonomous Enhancement of Disruption Tolerant Networks. [Citation Graph (, )][DBLP]


  42. Study of a bus-based disruption-tolerant network: mobility modeling and impact on routing. [Citation Graph (, )][DBLP]


  43. A survey of practical issues in underwater networks. [Citation Graph (, )][DBLP]


  44. Relays, base stations, and meshes: enhancing mobile networks with infrastructure. [Citation Graph (, )][DBLP]


  45. Web search from a bus. [Citation Graph (, )][DBLP]


  46. Enhancing interactive web applications in hybrid networks. [Citation Graph (, )][DBLP]


  47. Surviving attacks on disruption-tolerant networks without authentication. [Citation Graph (, )][DBLP]


  48. Interactive wifi connectivity for moving vehicles. [Citation Graph (, )][DBLP]


  49. Maximizing transfer opportunities in bluetooth DTNs. [Citation Graph (, )][DBLP]


  50. MORA routing and capacity building in disruption-tolerant networks. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002