Seguir
Nickolai Zeldovich
Nickolai Zeldovich
Afiliación desconocida
Dirección de correo verificada de csail.mit.edu
Título
Citado por
Citado por
Año
Algorand: Scaling byzantine agreements for cryptocurrencies
Y Gilad, R Hemo, S Micali, G Vlachos, N Zeldovich
Proceedings of the 26th symposium on operating systems principles, 51-68, 2017
18052017
CryptDB: Protecting confidentiality with encrypted query processing
RA Popa, CMS Redfield, N Zeldovich, H Balakrishnan
Proceedings of the twenty-third ACM symposium on operating systems …, 2011
17642011
Making information flow explicit in HiStar
N Zeldovich, S Boyd-Wickizer, E Kohler, D Mazieres
Communications of the ACM 54 (11), 93-101, 2011
10572011
An analysis of Linux scalability to many cores
S Boyd-Wickizer, AT Clements, Y Mao, A Pesterev, MF Kaashoek, ...
9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), 2010
5612010
Tactics-based remote execution for mobile computing
RK Balan, M Satyanarayanan, SY Park, T Okoshi
Proceedings of the 1st international conference on Mobile systems …, 2003
532*2003
An ideal-security protocol for order-preserving encoding
RA Popa, FH Li, N Zeldovich
2013 IEEE Symposium on Security and Privacy, 463-477, 2013
5182013
Relational cloud: A database-as-a-service for the cloud
C Curino, EPC Jones, RA Popa, N Malviya, E Wu, S Madden, ...
5182011
Reusable garbled circuits and succinct functional encryption
S Goldwasser, Y Kalai, RA Popa, V Vaikuntanathan, N Zeldovich
Proceedings of the forty-fifth annual ACM symposium on Theory of computing …, 2013
5172013
Processing analytical queries over encrypted data
SL Tu, MF Kaashoek, SR Madden, N Zeldovich
Association for Computing Machinery (ACM), 2013
4882013
Securing Distributed Systems with Information Flow Control.
N Zeldovich, S Boyd-Wickizer, D Mazieres
NSDI 8, 293-308, 2008
3582008
Vuvuzela: Scalable private messaging resistant to traffic analysis
J Van Den Hooff, D Lazar, M Zaharia, N Zeldovich
Proceedings of the 25th Symposium on Operating Systems Principles, 137-152, 2015
3442015
Using Crash Hoare logic for certifying the FSCQ file system
H Chen, D Ziegler, T Chajed, A Chlipala, MF Kaashoek, N Zeldovich
Proceedings of the 25th Symposium on Operating Systems Principles, 18-37, 2015
3162015
Virtual Appliances for Deploying and Maintaining Software.
CP Sapuntzakis, D Brumley, R Chandra, N Zeldovich, J Chow, MS Lam, ...
LISA 3, 181-194, 2003
2682003
Virtual appliance management
MSL Lam, CP Sapuntzakis, RUV Chandra, NB Zeldovich, M Rosenblum, ...
US Patent 7,890,689, 2011
2642011
How to run turing machines on encrypted data
S Goldwasser, YT Kalai, RA Popa, V Vaikuntanathan, N Zeldovich
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
2502013
Improving application security with data flow assertions
A Yip, X Wang, N Zeldovich, MF Kaashoek
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009
2492009
The scalable commutativity rule: Designing scalable software for multicore processors
AT Clements, MF Kaashoek, N Zeldovich, RT Morris, E Kohler
ACM Transactions on Computer Systems (TOCS) 32 (4), 1-47, 2015
2462015
CryptDB: processing queries on an encrypted database
RA Popa, CMS Redfield, N Zeldovich, H Balakrishnan
Communications of the ACM 55 (9), 103-111, 2012
2402012
Energy management in mobile devices with the Cinder operating system
A Roy, SM Rumble, R Stutsman, P Levis, D Mazières, N Zeldovich
Proceedings of the sixth conference on Computer systems, 139-152, 2011
219*2011
The collective: A cache-based system management architecture
R Chandra, N Zeldovich, C Sapuntzakis, MS Lam
Proceedings of the 2nd conference on Symposium on Networked Systems Design …, 2005
2172005
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20