Michael J. Freedman
Michael J. Freedman
Robert E. Kahn Professor of Computer Science, Princeton University
Verified email at - Homepage
Cited by
Cited by
Ethane: Taking control of the enterprise
M Casado, MJ Freedman, J Pettit, J Luo, N McKeown, S Shenker
ACM SIGCOMM computer communication review 37 (4), 1-12, 2007
Efficient private matching and set intersection
MJ Freedman, K Nissim, B Pinkas
International conference on the theory and applications of cryptographic …, 2004
Tarzan: A peer-to-peer anonymizing network layer
MJ Freedman, R Morris
Proceedings of the 9th ACM Conference on Computer and Communications …, 2002
Frenetic: A network programming language
N Foster, R Harrison, MJ Freedman, C Monsanto, J Rexford, A Story, ...
ACM Sigplan Notices 46 (9), 279-291, 2011
Scalable flow-based networking with DIFANE
M Yu, J Rexford, MJ Freedman, J Wang
ACM SIGCOMM Computer Communication Review 40 (4), 351-362, 2010
Don't settle for eventual: scalable causal consistency for wide-area storage with COPS
W Lloyd, MJ Freedman, M Kaminsky, DG Andersen
Proceedings of the Twenty-Third ACM Symposium on Operating Systems …, 2011
Democratizing content publication with coral.
MJ Freedman, E Freudenthal, D Mazieres
NSDI 4, 18-18, 2004
The free haven project: Distributed anonymous storage service
R Dingledine, MJ Freedman, D Molnar
Designing Privacy Enhancing Technologies: International Workshop on Design …, 2001
SANE: A Protection Architecture for Enterprise Networks.
M Casado, T Garfinkel, A Akella, MJ Freedman, D Boneh, N McKeown, ...
USENIX security symposium 49, 50, 2006
Blockstack: A global naming and storage system secured by blockchains
M Ali, J Nelson, R Shea, MJ Freedman
2016 USENIX annual technical conference (USENIX ATC 16), 181-194, 2016
Keyword search and oblivious pseudorandom functions
MJ Freedman, Y Ishai, B Pinkas, O Reingold
Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005
On-the-fly verification of rateless erasure codes for efficient content distribution
MN Krohn, MJ Freedman, D Mazieres
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 226-240, 2004
Live video analytics at scale with approximation and {Delay-Tolerance}
H Zhang, G Ananthanarayanan, P Bodik, M Philipose, P Bahl, ...
14th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2017
Secure network switching infrastructure
M Casado, N McKeown, D Boneh, MJ Freedman, S Shenker
US Patent App. 11/970,976, 2008
Performance isolation and fairness for {Multi-Tenant} cloud storage
D Shue, MJ Freedman, A Shaikh
10th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2012
{SPORC}: Group Collaboration using Untrusted Cloud Resources
AJ Feldman, WP Zeller, MJ Freedman, EW Felten
9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), 2010
Stronger Semantics for {Low-Latency}{Geo-Replicated} Storage
W Lloyd, MJ Freedman, M Kaminsky, DG Andersen
10th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2013
CONIKS: Bringing Key Transparency to End Users
MS Melara, A Blankstein, J Bonneau, EW Felten, MJ Freedman
24th USENIX Security Symposium (USENIX Security 15), 383-398, 2015
Donar: decentralized server selection for cloud services
P Wendell, JW Jiang, MJ Freedman, J Rexford
Proceedings of the ACM SIGCOMM 2010 conference, 231-242, 2010
Languages for software-defined networks
N Foster, A Guha, M Reitblatt, A Story, MJ Freedman, NP Katta, ...
IEEE Communications Magazine 51 (2), 128-134, 2013
The system can't perform the operation now. Try again later.
Articles 1–20