Publications
Secure distributed membership tests via secret sharing: How to hide your hostile hosts: Harnessing shamir secret sharing
2016 International Conference on Computing, Networking and Communications, ICNC 2016
TWIAD the Write-Optimized IP Address Database
Track Network Events with Write Optimized Data Structures
4 Results