David Zage

According to our database1, David Zage authored at least 25 papers between 2006 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
A Marauder's Map for the IoT Edge.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019

2017
An Architectural Vision for a Data-Centric IoT: Rethinking Things, Trust and Clouds.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
Anti-Persistence on Persistent Storage: History-Independent Sparse Tables and Dictionaries.
Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, 2016

Secure distributed membership tests via secret sharing: How to hide your hostile hosts: Harnessing shamir secret sharing.
Proceedings of the 2016 International Conference on Computing, 2016

2015
Tracking Network Events with Write Optimized Data Structures: The Design and Implementation of TWIAD: The Write-Optimized IP Address Database.
CoRR, 2015

Physically Unclonable Digital ID.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015

Using linkography to understand cyberattacks.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Tracking Network Events with Write Optimized Data Structures.
Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2015

2014
EMBERS: EpheMeral biometrically enhanced real-time location System.
Proceedings of the International Carnahan Conference on Security Technology, 2014

2013
Improving supply chain security using big data.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Harnessing many-core processors for scalable, highly efficient, and adaptable firewall solutions.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

2012
Addressing insider threat using "where you are" as fourth factor authentication.
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2012

Utilizing linear subspaces to improve cloud security.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012

2011
Removing the blinders: Using information to mitigate adversaries in adaptive overlays.
Proceedings of the 5th International Conference on Network and System Security, 2011

Applying game theory to analyze attacks and defenses in virtual coordinate systems.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

2010
A platform for creating efficient, robust, and resilient peer-to-peer systems
PhD thesis, 2010

Robust Decentralized Virtual Coordinate Systems in Adversarial Environments.
ACM Trans. Inf. Syst. Secur., 2010

Steward: Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks.
IEEE Trans. Dependable Secur. Comput., 2010

2009
A survey of attack and defense techniques for reputation systems.
ACM Comput. Surv., 2009

A Network-Aware Distributed Membership Protocol for Collaborative Defense.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
A framework for mitigating attacks against measurement-based adaptation mechanisms in unstructured multicast overlay networks.
IEEE/ACM Trans. Netw., 2008

Experimental comparison of peer-to-peer streaming overlays: An application perspective.
Proceedings of the LCN 2008, 2008

2007
On the accuracy of decentralized virtual coordinate systems in adversarial networks.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks.
Proceedings of the 14th IEEE International Conference on Network Protocols, 2006

Scaling Byzantine Fault-Tolerant Replication toWide Area Networks.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006


  Loading...