Alex X. Liu

According to our database1, Alex X. Liu
  • authored at least 193 papers between 2003 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2017
STPP: Spatial-Temporal Phase Profiling-Based Method for Relative RFID Tag Localization.
IEEE/ACM Trans. Netw., 2017

PASE: Synthesizing Existing Transport Strategies for Near-Optimal Data Center Transport.
IEEE/ACM Trans. Netw., 2017

RFID Estimation With Blocker Tags.
IEEE/ACM Trans. Netw., 2017

Multi-Category RFID Estimation.
IEEE/ACM Trans. Netw., 2017

Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Networks.
IEEE/ACM Trans. Netw., 2017

Automated Online Exam Proctoring.
IEEE Trans. Multimedia, 2017

Behavior Based Human Authentication on Touch Screen Devices Using Gestures and Signatures.
IEEE Trans. Mob. Comput., 2017

Firewall Fingerprinting and Denial of Firewalling Attacks.
IEEE Trans. Information Forensics and Security, 2017

Device-Free Human Activity Recognition Using Commercial WiFi Devices.
IEEE Journal on Selected Areas in Communications, 2017

Recognizing Keystrokes Using WiFi Devices.
IEEE Journal on Selected Areas in Communications, 2017

Dynamic Scaling of Virtualized, Distributed Service Chains: A Case Study of IMS.
CoRR, 2017

A Speed Hump Sensing Approach to Global Positioning in Urban Cities without Gps Signals.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

Radiation Constrained Scheduling of Wireless Charging Tasks.
Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2017

Adaptively Secure Conjunctive Query Processing over Encrypted Data for Cloud Computing.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Secure KNN Queries over Encrypted Data: Dimensionality Is Not Always a Curse.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Fast and Accurate Tracking of Population Dynamics in RFID Systems.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
Freeweb: P2P-Assisted Collaborative Censorship-Resistant Web Browsing.
IEEE Trans. Parallel Distrib. Syst., 2016

Fast and Reliable Detection and Identification of Missing RFID Tags in the Wild.
IEEE/ACM Trans. Netw., 2016

Accurate and Efficient Per-Flow Latency Measurement Without Probing and Time Stamping.
IEEE/ACM Trans. Netw., 2016

Characterizing and Optimizing Cellular Network Performance During Crowded Events.
IEEE/ACM Trans. Netw., 2016

Overlay Automata and Algorithms for Fast and Scalable Regular Expression Matching.
IEEE/ACM Trans. Netw., 2016

Packet Classification Using Binary Content Addressable Memory.
IEEE/ACM Trans. Netw., 2016

Fast and Scalable Range Query Processing With Strong Privacy Protection for Cloud Computing.
IEEE/ACM Trans. Netw., 2016

A Difference Resolution Approach to Compressing Access Control Lists.
IEEE/ACM Trans. Netw., 2016

Editor's Note.
IEEE Trans. Dependable Sec. Comput., 2016

A Shifting Bloom Filter Framework for Set Queries.
PVLDB, 2016

Finding Persistent Items in Data Streams.
PVLDB, 2016

Modeling packet loss probability and busy time in multi-hop wireless networks.
EURASIP J. Wireless Comm. and Networking, 2016

Online VNF Scaling in Datacenters.
CoRR, 2016

OpenFunction: Data Plane Abstraction for Software-Defined Middleboxes.
CoRR, 2016

Online Scaling of NFV Service Chains across Geo-distributed Datacenters.
CoRR, 2016

Towards Designing PLC Networks for Ubiquitous Connectivity in Enterprises.
CoRR, 2016

Noisy Bloom Filters for Multi-Set Membership Testing.
Proceedings of the 2016 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Science, 2016

Integrity Preserving Multi-keyword Searchable Encryption for Cloud Computing.
Proceedings of the Provable Security, 2016

A stochastic frame based approach to RFID tag searching.
Proceedings of the 2016 IFIP Networking Conference, 2016

Device-free gesture tracking using acoustic signals: demo.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Device-free gesture tracking using acoustic signals.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Characterizing caching workload of a large commercial Content Delivery Network.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Top-k queries for multi-category RFID systems.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Radiation constrained wireless charger placement.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Detecting and localizing end-to-end performance degradation for cellular data services.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

A sorted partitioning approach to high-speed and fast-update OpenFlow classification.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Fit the elephant in a box - towards IP lookup at on-chip memory access speed.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Macroflow: A fine-grained networking abstraction for job completion time oriented scheduling in datacenters.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

OpenFunction: An extensible data plane abstraction protocol for platform-independent software-defined middleboxes.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Omnidirectional chargability with directional antennas.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

A template approach to group key establishment in dynamic ad-hoc groups.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Boosting powerline communications for ubiquitous connectivity in enterprises.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Optimizing Internet transit routing for content delivery networks.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

A De-compositional Approach to Regular Expression Matching for Network Security Applications.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

The Internet is for Porn: Measurement and Analysis of Online Adult Traffic.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Social Graph Publishing with Privacy Guarantees.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Detecting national political unrest on Twitter.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Gait recognition using wifi signals.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

A traffic flow approach to early detection of gathering events.
Proceedings of the 24th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, GIS 2016, Burlingame, California, USA, October 31, 2016

Network Scheduling Aware Task Placement in Datacenters.
Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, 2016

The Rich and the Poor: A Markov Decision Process Approach to Optimizing Taxi Driver Revenue Efficiency.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

Online VNF Scaling in Datacenters.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Probabilistic Optimal Tree Hopping for RFID Identification.
IEEE/ACM Trans. Netw., 2015

Fast and Accurate Estimation of RFID Tags.
IEEE/ACM Trans. Netw., 2015

Privacy-Preserving Quantification of Cross-Domain Network Reachability.
IEEE/ACM Trans. Netw., 2015

Geospatial and Temporal Dynamics of Application Usage in Cellular Data Networks.
IEEE Trans. Mob. Comput., 2015

Topological Transformation Approaches to Database Query Processing.
IEEE Trans. Knowl. Data Eng., 2015

Sampling Bloom Filter-Based Detection of Unknown RFID Tags.
IEEE Trans. Communications, 2015

Completely Pinpointing the Missing RFID Tags in a Time-Efficient Way.
IEEE Trans. Computers, 2015

A Shifting Bloom Filter Framework for Set Queries.
CoRR, 2015

Detecting and Localizing End-to-End Performance Degradation for Cellular Data Services.
Proceedings of the 2015 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2015

Relative Localization of RFID Tags using Spatial-Temporal Phase Profiling.
Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation, 2015

Understanding and Modeling of WiFi Signal Based Human Activity Recognition.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

Keystroke Recognition Using WiFi Signals.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

Expecting the unexpected: Fast and reliable detection of missing RFID tags in the wild.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

RFID cardinality estimation with blocker tags.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Human object estimation via backscattered radio frequency signal.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Fairness Matters: Identification of Active RFID Tags with Statistically Guaranteed Fairness.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

Privacy Preserving String Matching for Cloud Computing.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

IM session identification by outlier detection in cross-correlation functions.
Proceedings of the 49th Annual Conference on Information Sciences and Systems, 2015

2014
Energy-Aware Virtual Network Embedding.
IEEE/ACM Trans. Netw., 2014

Bypassing Space Explosion in High-Speed Regular Expression Matching.
IEEE/ACM Trans. Netw., 2014

Fast Regular Expression Matching Using Small TCAM.
IEEE/ACM Trans. Netw., 2014

A Multiple Hashing Approach to Complete Identification of Missing RFID Tags.
IEEE Trans. Communications, 2014

Fast Range Query Processing with Strong Privacy Protection for Cloud Computing.
PVLDB, 2014

High-Speed Application Protocol Parsing and Extraction for Deep Flow Inspection.
IEEE Journal on Selected Areas in Communications, 2014

Towards Fast and Optimal Grouping of Regular Expressions via DFA Size Estimation.
IEEE Journal on Selected Areas in Communications, 2014

Multiple bulk data transfers scheduling among datacenters.
Computer Networks, 2014

Noise can help: accurate and efficient per-flow latency measurement without packet probing and time stamping.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2014

Revisiting caching in content delivery networks.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2014

Understanding the impact of network dynamics on mobile video user engagement.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2014

Guarantee IP lookup performance with FIB explosion.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

Friends, not foes: synthesizing existing transport strategies for data center networks.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

Privacy and integrity preserving multi-dimensional range queries for cloud computing.
Proceedings of the 2014 IFIP Networking Conference, Trondheim, 2014

An overlay automata approach to regular expression matching.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Packet classification using binary Content Addressable Memory.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Breaching IM session privacy using causality.
Proceedings of the IEEE Global Communications Conference, 2014

2013
Large-Scale Measurement and Characterization of Cellular Machine-to-Machine Traffic.
IEEE/ACM Trans. Netw., 2013

Quantifying and Verifying Reachability for Access Controlled Networks.
IEEE/ACM Trans. Netw., 2013

An Information-Theoretical Approach to High-Speed Flow Nature Identification.
IEEE/ACM Trans. Netw., 2013

Cross-Domain Privacy-Preserving Cooperative Firewall Optimization.
IEEE/ACM Trans. Netw., 2013

Dynamic camouflage event based malicious node detection architecture.
The Journal of Supercomputing, 2013

Identifying Leaders and Followers in Online Social Networks.
IEEE Journal on Selected Areas in Communications, 2013

A Distributed Algorithm for Identifying Information Hubs in Social Networks.
IEEE Journal on Selected Areas in Communications, 2013

TCAMChecker: A Software Approach to the Error Detection and Correction of TCAM-Based Networking Systems.
J. Network Syst. Manage., 2013

Modeling Morphology of Social Network Cascades
CoRR, 2013

A Random Matrix Approach to Differential Privacy and Structure Preserved Social Network Graph Publishing.
CoRR, 2013

Probabilistic optimal tree hopping for RFID identification.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2013

A first look at cellular network performance during crowded events.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2013

Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it.
Proceedings of the 19th Annual International Conference on Mobile Computing and Networking, 2013

Time- and Energy-Efficient Detection of Unknown Tags in Large-Scale RFID Systems.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

A Multi-partitioning Approach to Building Fast and Accurate Counting Bloom Filters.
Proceedings of the 27th IEEE International Symposium on Parallel and Distributed Processing, 2013

A digital watermarking approach to secure and precise range query processing in sensor networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

A difference resolution approach to compressing Access Control Lists.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Freeweb: P2P-Assisted Collaborative Censorship-Resistant Web Browsing.
Proceedings of the 42nd International Conference on Parallel Processing, 2013

A few bits are enough - ASIC friendly Regular Expression matching for high speed network security systems.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

Who are you talking to? Breaching privacy in encrypted IM networks.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

Cross-path inference attacks on multipath TCP.
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 2013

A Ternary Unification Framework for optimizing TCAM-based packet classification systems.
Proceedings of the Symposium on Architecture for Networking and Communications Systems, 2013

GAMT: A fast and scalable IP lookup engine for GPU-based software routers.
Proceedings of the Symposium on Architecture for Networking and Communications Systems, 2013

Scalable TCAM-based regular expression matching with compressed finite automata.
Proceedings of the Symposium on Architecture for Networking and Communications Systems, 2013

2012
Bit Weaving: A Non-Prefix Approach to Compressing Packet Classifiers in TCAMs.
IEEE/ACM Trans. Netw., 2012

Privacy- and integrity-preserving range queries in sensor networks.
IEEE/ACM Trans. Netw., 2012

Firewall policy change-impact analysis.
ACM Trans. Internet Techn., 2012

Systematic Structural Testing of Firewall Policies.
IEEE Trans. Network and Service Management, 2012

Towards high performance security policy evaluation.
The Journal of Supercomputing, 2012

First step towards automatic correction of firewall policy faults.
TAAS, 2012

A secure cookie scheme.
Computer Networks, 2012

First Step toward Cloud-Based Firewalling.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

A first look at cellular machine-to-machine traffic: large scale measurement and characterization.
Proceedings of the ACM SIGMETRICS/PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems, 2012

A Task-Based Model for the Lifespan of Peer-to-Peer Swarms.
Proceedings of the NETWORKING 2012, 2012

Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Every bit counts: fast and scalable RFID estimation.
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012

Characterizing geospatial dynamics of application usage in a 3G cellular data network.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

FlowSifter: A counting automata approach to layer 7 field extraction for deep flow inspection.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Firewall fingerprinting.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

A large scale exploratory analysis of software vulnerability life cycles.
Proceedings of the 34th International Conference on Software Engineering, 2012

A semantics aware approach to automated reverse engineering unknown protocols.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

A Prefiltering Approach to Regular Expression Matching for Network Security Systems.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Compressing Network Access Control Lists.
IEEE Trans. Parallel Distrib. Syst., 2011

Privacy Preserving Collaborative Enforcement of Firewall Policies in Virtual Private Networks.
IEEE Trans. Parallel Distrib. Syst., 2011

Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough.
IEEE Trans. Parallel Distrib. Syst., 2011

Topological transformation approaches to TCAM-based packet classification.
IEEE/ACM Trans. Netw., 2011

Designing Fast and Scalable XACML Policy Evaluation Engines.
IEEE Trans. Computers, 2011

Characterizing and modeling internet traffic dynamics of cellular devices.
Proceedings of the SIGMETRICS 2011, 2011

A Random Walk Approach to Modeling the Dynamics of the Blogosphere.
Proceedings of the NETWORKING 2011, 2011

Collaborative firewalling in wireless networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

A distributed and privacy preserving algorithm for identifying information hubs in social networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Offset addressing approach to memory-efficient IP address lookup.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

A cross-domain privacy-preserving protocol for cooperative firewall optimization.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Privacy-preserving cross-domain network reachability quantification.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

Large scale Hamming distance query processing.
Proceedings of the 27th International Conference on Data Engineering, 2011

Split: Optimizing Space, Power, and Throughput for TCAM-Based Classification.
Proceedings of the 2011 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), 2011

2010
Complete Redundancy Removal for Packet Classifiers in TCAMs.
IEEE Trans. Parallel Distrib. Syst., 2010

TCAM Razor: a systematic approach towards minimizing packet classifiers in TCAMs.
IEEE/ACM Trans. Netw., 2010

RFIDGuard: a lightweight privacy and authentication protocol for passive RFID tags.
Security and Communication Networks, 2010

Transforming Range Queries To Equivalent Box Queries To Optimize Page Access.
PVLDB, 2010

Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems.
Proceedings of the 19th USENIX Security Symposium, 2010

First Step Towards Automatic Correction of Firewall Policy Faults.
Proceedings of the Uncovering the Secrets of System Administration: Proceedings of the 24th Large Installation System Administration Conference, 2010

SafeQ: Secure and Efficient Query Processing in Sensor Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Quantifying and Querying Network Reachability.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

Firewall Design and Analysis
Computer and Network Security 4, World Scientific, ISBN: 978-981-4468-37-4, 2010

2009
Firewall Policy Queries.
IEEE Trans. Parallel Distrib. Syst., 2009

PAP: A privacy and authentication protocol for passive RFID tags.
Computer Communications, 2009

Firewall policy verification and troubleshooting.
Computer Networks, 2009

Fault Localization for Firewall Policies.
Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), 2009

Topological transformation approaches to optimizing TCAM-based packet classification systems.
Proceedings of the Eleventh International Joint Conference on Measurement and Modeling of Computer Systems, 2009

CENDA-Camouflage Event Based Malicious Node Detection Architecture.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Bit Weaving: A Non-prefix Approach to Compressing Packet Classifiers in TCAMs.
Proceedings of the 17th annual IEEE International Conference on Network Protocols, 2009

High-Speed Flow Nature Identification.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

2008
Diverse Firewall Design.
IEEE Trans. Parallel Distrib. Syst., 2008

Formal Specification and Verification of a Secure Micropayment Protocol.
I. J. Network Security, 2008

Systematic Structural Testing of Firewall Policies.
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008

Algorithmic approaches to redesigning tcam-based systems.
Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2008

Xengine: a fast and scalable XACML policy evaluation engine.
Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2008

Collaborative enforcement of firewall policies in virtual private networks.
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008

Firewall Compressor: An Algorithm for Minimizing Firewall Policies.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

All-Match Based Complete Redundancy Removal for Packet Classifiers in TCAMs.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Formal Verification of Firewall Policies.
Proceedings of IEEE International Conference on Communications, 2008

Securing Sensor Nodes Against Side Channel Attacks.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Verification of Distributed Firewalls.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough.
Proceedings of the Computer Security, 2008

2007
SPP: An anti-phishing single password protocol.
Computer Networks, 2007

Structured firewall design.
Computer Networks, 2007

TCAM Razor: A Systematic Approach Towards Minimizing Packet Classifiers in TCAMs.
Proceedings of the IEEE International Conference on Network Protocols, 2007

Change-Impact Analysis of Firewall Policies.
Proceedings of the Computer Security, 2007

2006
Key bundles and parcels: Secure communication in many groups.
Computer Networks, 2006

On capturing and containing E-mail worms.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

2005
Zmail: Zero-Sum Free Market Control of Spam.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

A secure cookie protocol.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005

A Model of Stateful Firewalls and Its Properties.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

Complete Redundancy Detection in Firewalls.
Proceedings of the Data and Applications Security XIX, 2005

2004
Firewall Queries.
Proceedings of the Principles of Distributed Systems, 8th International Conference, 2004

Firewall Design: Consistency, Completeness, and Compactness.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

Formal Specification and Verification of a Micropayment Protocol.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 2004), 2004

Diverse Firewall Design.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

2003
Key Bundels and Parcels: Secure Communication in Many Groups.
Proceedings of the Group Communications and Charges; Technology and Business Models, 2003


  Loading...