P2P Routing Table Poisoning: A Quorum-based Sanitizing Approach
Efficient Verification of Program Fragments: Eager POR
Quantifiably Trusting the Cloud: Putting Metrics to Work!
Identifying and Utilizing Dependencies Across Cloud Security Services
On Choosing Server- or Client-Side Solutions for BFT
Named Data Networking: A Survey
Quantitative Reasoning about Cloud Security Using Service Level Agreements
PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation