• Publications
  • Influence
SOS: secure overlay services
Denial of service (DoS) attacks continue to threaten the reliability of networking systems. Previous approaches for protecting networks from DoS attacks are reactive in that they wait for an attackExpand
  • 535
  • 45
  • Open Access
Distributed Channel Assignment in Multi-Radio 802.11 Mesh Networks
To increase the utilization of the available frequency channel space in 802.11-based wireless mesh networks, recent work has explored solutions based on multi-radio stations. This paper reports onExpand
  • 284
  • 26
  • Open Access
Growth codes: maximizing sensor network data persistence
Sensor networks are especially useful in catastrophic or emergency scenarios such as floods, fires, terrorist attacks or earthquakes where human participation may be too dangerous. However, suchExpand
  • 219
  • 23
SOS: an architecture for mitigating DDoS attacks
We propose an architecture called secure overlay services (SOS) that proactively prevents denial of service (DoS) attacks, including distributed (DDoS) attacks; it is geared toward supportingExpand
  • 207
  • 21
  • Open Access
Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks
802.11a, b, and g standards were designed for deployment in cooperative environments, and hence do not include mechanisms to protect from jamming attacks. In this paper, we explore how to protectExpand
  • 231
  • 20
  • Open Access
Detecting shared congestion of flows via end-to-end measurement
Current Internet congestion control protocols operate independently on a per-flow basis. Recent work has demonstrated that cooperative congestion control strategies between flows can improveExpand
  • 159
  • 19
  • Open Access
A lightweight, robust P2P system to handle flash crowds
An Internet flash crowd (also known as hot spots) is a phenomenon that results from a sudden, unpredicted increase in an on-line object's popularity. Currently, there is no efficient means within theExpand
  • 136
  • 13
  • Open Access
Using graphic turing tests to counter automated DDoS attacks against web servers
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits two keyExpand
  • 165
  • 12
  • Open Access
Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces
Protocols for generic secure multi-party computation (MPC) generally come in two forms: they either represent the function being computed as a boolean circuit, or as an arithmetic circuit over aExpand
  • 105
  • 11
  • Open Access
Growth codes: maximizing sensor network data persistence
Sensor networks are especially useful in catastrophic or emergency scenarios such as floods, fires, terrorist attacks or earthquakes where human participation may be too dangerous. However, suchExpand
  • 129
  • 8
  • Open Access