Michael J. Freedman
Michael J. Freedman
Robert E. Kahn Professor of Computer Science, Princeton University
Verified email at - Homepage
Cited by
Cited by
Ethane: Taking control of the enterprise
M Casado, MJ Freedman, J Pettit, J Luo, N McKeown, S Shenker
ACM SIGCOMM computer communication review 37 (4), 1-12, 2007
Efficient private matching and set intersection
MJ Freedman, K Nissim, B Pinkas
International conference on the theory and applications of cryptographic …, 2004
Tarzan: A peer-to-peer anonymizing network layer
MJ Freedman, R Morris
Proceedings of the 9th ACM conference on Computer and communications …, 2002
Scalable flow-based networking with DIFANE
M Yu, J Rexford, MJ Freedman, J Wang
ACM SIGCOMM Computer Communication Review 40 (4), 351-362, 2010
Frenetic: A network programming language
N Foster, R Harrison, MJ Freedman, C Monsanto, J Rexford, A Story, ...
ACM Sigplan Notices 46 (9), 279-291, 2011
Don't settle for eventual: Scalable causal consistency for wide-area storage with COPS
W Lloyd, MJ Freedman, M Kaminsky, DG Andersen
Proceedings of the Twenty-Third ACM Symposium on Operating Systems …, 2011
SANE: A Protection Architecture for Enterprise Networks.
M Casado, T Garfinkel, A Akella, MJ Freedman, D Boneh, N McKeown, ...
USENIX Security Symposium 49, 50, 2006
Democratizing content publication with coral.
MJ Freedman, E Freudenthal, D Mazieres
NSDI 4, 18-18, 2004
The free haven project: Distributed anonymous storage service
R Dingledine, MJ Freedman, D Molnar
Designing Privacy Enhancing Technologies: International Workshop on Design …, 2001
Blockstack: A global naming and storage system secured by blockchains
M Ali, J Nelson, R Shea, MJ Freedman
2016 USENIX annual technical conference (USENIX ATC 16), 181-194, 2016
On-the-fly verification of rateless erasure codes for efficient content distribution
MN Krohn, MJ Freedman, D Mazieres
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 226-240, 2004
Keyword search and oblivious pseudorandom functions
MJ Freedman, Y Ishai, B Pinkas, O Reingold
Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005
Live video analytics at scale with approximation and {Delay-Tolerance}
H Zhang, G Ananthanarayanan, P Bodik, M Philipose, P Bahl, ...
14th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2017
Secure network switching infrastructure
M Casado, N McKeown, D Boneh, MJ Freedman, S Shenker
US Patent App. 11/970,976, 2008
{SPORC}: Group Collaboration using Untrusted Cloud Resources
AJ Feldman, WP Zeller, MJ Freedman, EW Felten
9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), 2010
Performance Isolation and Fairness for {Multi-Tenant} Cloud Storage
D Shue, MJ Freedman, A Shaikh
10th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2012
Stronger Semantics for {Low-Latency}{Geo-Replicated} Storage
W Lloyd, MJ Freedman, M Kaminsky, DG Andersen
10th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2013
CONIKS: Bringing Key Transparency to End Users
MS Melara, A Blankstein, J Bonneau, EW Felten, MJ Freedman
24th USENIX Security Symposium (USENIX Security 15), 383-398, 2015
Donar: decentralized server selection for cloud services
P Wendell, JW Jiang, MJ Freedman, J Rexford
Proceedings of the ACM SIGCOMM 2010 conference, 231-242, 2010
Languages for software-defined networks
N Foster, A Guha, M Reitblatt, A Story, MJ Freedman, NP Katta, ...
IEEE Communications Magazine 51 (2), 128-134, 2013
The system can't perform the operation now. Try again later.
Articles 1–20