Ethane: Taking control of the enterprise M Casado, MJ Freedman, J Pettit, J Luo, N McKeown, S Shenker ACM SIGCOMM computer communication review 37 (4), 1-12, 2007 | 1719 | 2007 |
Efficient private matching and set intersection MJ Freedman, K Nissim, B Pinkas International conference on the theory and applications of cryptographic …, 2004 | 1684 | 2004 |
Tarzan: A peer-to-peer anonymizing network layer MJ Freedman, R Morris Proceedings of the 9th ACM Conference on Computer and Communications …, 2002 | 1170 | 2002 |
Frenetic: A network programming language N Foster, R Harrison, MJ Freedman, C Monsanto, J Rexford, A Story, ... ACM Sigplan Notices 46 (9), 279-291, 2011 | 1078 | 2011 |
Scalable flow-based networking with DIFANE M Yu, J Rexford, MJ Freedman, J Wang ACM SIGCOMM Computer Communication Review 40 (4), 351-362, 2010 | 997 | 2010 |
Don't settle for eventual: Scalable causal consistency for wide-area storage with COPS W Lloyd, MJ Freedman, M Kaminsky, DG Andersen Proceedings of the Twenty-Third ACM Symposium on Operating Systems …, 2011 | 905 | 2011 |
Democratizing content publication with coral. MJ Freedman, E Freudenthal, D Mazieres NSDI 4, 18-18, 2004 | 787 | 2004 |
SANE: A Protection Architecture for Enterprise Networks. M Casado, T Garfinkel, A Akella, MJ Freedman, D Boneh, N McKeown, ... USENIX security symposium 49, 50, 2006 | 776 | 2006 |
The free haven project: Distributed anonymous storage service R Dingledine, MJ Freedman, D Molnar Designing Privacy Enhancing Technologies: International Workshop on Design …, 2001 | 775 | 2001 |
Blockstack: A global naming and storage system secured by blockchains M Ali, J Nelson, R Shea, MJ Freedman 2016 USENIX annual technical conference (USENIX ATC 16), 181-194, 2016 | 732 | 2016 |
Keyword search and oblivious pseudorandom functions MJ Freedman, Y Ishai, B Pinkas, O Reingold Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005 | 544 | 2005 |
On-the-fly verification of rateless erasure codes for efficient content distribution MN Krohn, MJ Freedman, D Mazieres IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 226-240, 2004 | 529 | 2004 |
Live video analytics at scale with approximation and {Delay-Tolerance} H Zhang, G Ananthanarayanan, P Bodik, M Philipose, P Bahl, ... 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2017 | 485 | 2017 |
Secure network switching infrastructure M Casado, N McKeown, D Boneh, MJ Freedman, S Shenker US Patent App. 11/970,976, 2008 | 406 | 2008 |
Performance Isolation and Fairness for {Multi-Tenant} Cloud Storage D Shue, MJ Freedman, A Shaikh 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2012 | 392 | 2012 |
{SPORC}: Group Collaboration using Untrusted Cloud Resources AJ Feldman, WP Zeller, MJ Freedman, EW Felten 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), 2010 | 384 | 2010 |
Stronger Semantics for {Low-Latency}{Geo-Replicated} Storage W Lloyd, MJ Freedman, M Kaminsky, DG Andersen 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2013 | 377 | 2013 |
CONIKS: Bringing Key Transparency to End Users MS Melara, A Blankstein, J Bonneau, EW Felten, MJ Freedman 24th USENIX Security Symposium (USENIX Security 15), 383-398, 2015 | 318 | 2015 |
Languages for software-defined networks N Foster, A Guha, M Reitblatt, A Story, MJ Freedman, NP Katta, ... IEEE Communications Magazine 51 (2), 128-134, 2013 | 276 | 2013 |
Donar: decentralized server selection for cloud services P Wendell, JW Jiang, MJ Freedman, J Rexford Proceedings of the ACM SIGCOMM 2010 conference, 231-242, 2010 | 275 | 2010 |