Martin Kleppmann

Orcid: 0000-0001-7252-6958

Affiliations:
  • TU Munich, Germany
  • University of Cambridge, Computer Laboratory (former)


According to our database1, Martin Kleppmann authored at least 34 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Bluesky and the AT Protocol: Usable Decentralized Social Media.
CoRR, 2024

Undo and Redo Support for Replicated Registers.
Proceedings of the 11th Workshop on Principles and Practice of Consistency for Distributed Data, 2024

Extending JSON CRDTs with Move Operations.
Proceedings of the 11th Workshop on Principles and Practice of Consistency for Distributed Data, 2024

2023
Extending JSON CRDT with Move Operations.
CoRR, 2023

Pudding: Private User Discovery in Anonymity Networks.
CoRR, 2023

The Art of the Fugue: Minimizing Interleaving in Collaborative Text Editing.
CoRR, 2023

2022
A Highly-Available Move Operation for Replicated Trees.
IEEE Trans. Parallel Distributed Syst., 2022

Covergence: Research for Practice reboot.
ACM Queue, 2022

Peritext: A CRDT for Collaborative Rich Text Editing.
Proc. ACM Hum. Comput. Interact., 2022

Research for practice: convergence.
Commun. ACM, 2022

Making CRDTs Byzantine fault tolerant.
Proceedings of the PaPoC@EuroSys 2022: Proceedings of the 9th Workshop on Principles and Practice of Consistency for Distributed Data, Rennes, France, April 5, 2022

2021
Rollercoaster: An Efficient Group-Multicast Scheme for Mix Networks.
Proceedings of the 30th USENIX Security Symposium, 2021

Thinking in events: from databases to distributed collaboration software: keynote at the 15th ACM International Conference on Distributed and Event-Based Systems (DEBS).
Proceedings of the 15th ACM International Conference on Distributed and Event-based Systems, 2021

2020
Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees.
IACR Cryptol. ePrint Arch., 2020

Byzantine Eventual Consistency and the Fundamental Limits of Peer-to-Peer Databases.
CoRR, 2020

Moving elements in list CRDTs.
Proceedings of the 7th Workshop on Principles and Practice of Consistency for Distributed Data, 2020

PushPin: towards production-quality peer-to-peer collaboration.
Proceedings of the 7th Workshop on Principles and Practice of Consistency for Distributed Data, 2020

2019
Apache Samza.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

Snapdoc: Authenticated snapshots with history privacy in peer-to-peer collaborative editing.
Proc. Priv. Enhancing Technol., 2019

Online event processing.
Commun. ACM, 2019

Ghost Trace on the Wire? Using Key Evidence for Informed Decisions.
Proceedings of the Security Protocols XXVII, 2019

Local-first software: you own your data, in spite of the cloud.
Proceedings of the 2019 ACM SIGPLAN International Symposium on New Ideas, 2019

Interleaving anomalies in collaborative text editors.
Proceedings of the 6th Workshop on Principles and Practice of Consistency for Distributed Data, 2019

2018
OpSets: Sequential Specifications for Replicated Datatypes (Extended Version).
CoRR, 2018

OpSets: Sequential Specifications for Replicated Datatypes.
Arch. Formal Proofs, 2018

From Secure Messaging to Secure Collaboration.
Proceedings of the Security Protocols XXVI, 2018

From Secure Messaging to Secure Collaboration (Transcript of Discussion).
Proceedings of the Security Protocols XXVI, 2018

2017
A Conflict-Free Replicated JSON Datatype.
IEEE Trans. Parallel Distributed Syst., 2017

Verifying strong eventual consistency in distributed systems.
Proc. ACM Program. Lang., 2017

A framework for establishing Strong Eventual Consistency for Conflict-free Replicated Datatypes.
Arch. Formal Proofs, 2017

2016
Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems
O'Reilly, ISBN: 978-1-4493-7332-0, 2016

2015
Kafka, Samza and the Unix Philosophy of Distributed Data.
IEEE Data Eng. Bull., 2015

A Critique of the CAP Theorem.
CoRR, 2015

Strengthening Public Key Authentication Against Key Theft (Short Paper).
Proceedings of the Technology and Practice of Passwords - 9th International Conference, 2015


  Loading...