<--- Back to Details
First PageDocument Content
Ethan
Date: 2012-11-29 17:13:37
Ethan

Add to Reading List

Source URL: www.cs.cmu.edu

Download Document from Source Website

File Size: 4,08 MB

Share Document on Facebook

Similar Documents

Computing / Information and communications technology / Computer network security / Data transmission / Network architecture / Computer networking / Internet architecture / Networking hardware / OpenFlow / Open vSwitch / Middlebox / Forwarding information base

SoftFlow: A Middlebox Architecture for Open vSwitch Ethan J. Jackson, University of California, Berkeley; Melvin Walls, Penn State Harrisburg and University of California, Berkeley; Aurojit Panda, University of Californi

DocID: 1xW3i - View Document

Cryptocurrencies / Blockchains / Bitcoin / Computing / Concurrent computing / Distributed computing / Alternative currencies / Ethereum / Smart contract / SegWit / Fork / Lightning Network

Atomically Trading with Roger: Gambling on the success of a hardfork Patrick McCorry1 , Ethan Heilman2 and Andrew Miller34 1 3

DocID: 1xVnv - View Document

Cryptocurrencies / Bitcoin / Free software / Money / Economy / Alternative currencies / Digital currencies / Decentralization / Blockchain / CoinDesk / Lightning Network / CoinJoin

Ethan Heilman January 18, 2017 http://cs-people.bu.edu/heilman/

DocID: 1xUeF - View Document

From the Consent of the Routed: Improving the Transparency of the RPKI Full version from June 9, 2014. Ethan Heilman Danny Cooper Leonid Reyzin

DocID: 1xU8V - View Document

Computer security / Computing / Compiler construction / Computer programming / Software engineering / Return-oriented programming / Control-flow integrity / Code reuse / Control flow graph / Program analysis / Data-flow analysis / Cyberattack

Poster: CRAFTED: Code Reuse Analysis for Trusted and Effective Defense Ethan Johnson Tianqin Zhao John Criswell

DocID: 1xTwl - View Document