Provably secure ciphertext policy ABE L Cheung, C Newport Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 1173 | 2007 |
Experimental evaluation of wireless simulation assumptions D Kotz, C Newport, RS Gray, J Liu, Y Yuan, C Elliott Proceedings of the 7th ACM international symposium on Modeling, analysis and …, 2004 | 724 | 2004 |
The mistaken axioms of wireless-network research D Kotz, C Newport, C Elliott | 348 | 2003 |
Outdoor experimental comparison of four ad hoc routing algorithms RS Gray, D Kotz, C Newport, N Dubrovsky, A Fiske, J Liu, C Masone, ... Proceedings of the 7th ACM international symposium on Modeling, analysis and …, 2004 | 222 | 2004 |
Improving wireless network performance using sensor hints L Ravindranath, C Newport, H Balakrishnan, S Madden Proc. USENIX NSDI 11, 281-294, 2011 | 140 | 2011 |
Experimental evaluation of wireless simulation assumptions C Newport, D Kotz, Y Yuan, RS Gray, J Liu, C Elliott Simulation 83 (9), 643-661, 2007 | 125 | 2007 |
Consensus and collision detectors in wireless ad hoc networks G Chockler, M Demirbas, S Gilbert, C Newport, T Nolte Proceedings of the twenty-fourth annual ACM Symposium on Principles of …, 2005 | 104 | 2005 |
Simulation validation using direct execution of wireless ad-hoc routing protocols J Liu, Y Yuan, DM Nicol, RS Gray, CC Newport, D Kotz, LF Perrone Proceedings of the eighteenth workshop on Parallel and distributed …, 2004 | 102 | 2004 |
The abstract MAC layer F Kuhn, N Lynch, C Newport Distributed Computing 24 (3), 187-206, 2011 | 94 | 2011 |
Gossiping in a multi-channel radio network: An oblivious approach to coping with malicious interference S Dolev, S Gilbert, R Guerraoui, C Newport International Symposium on Distributed Computing, 208-222, 2007 | 84 | 2007 |
Secure communication over radio channels S Dolev, S Gilbert, R Guerraoui, C Newport Proceedings of the twenty-seventh ACM symposium on Principles of distributed …, 2008 | 79 | 2008 |
Interference-resilient information exchange S Gilbert, R Guerraoui, DR Kowalski, C Newport IEEE INFOCOM 2009, 2249-2257, 2009 | 72 | 2009 |
Collusion-resistant group key management using attribute-based encryption L Cheung, JA Cooley, R Khazan, C Newport Cryptology ePrint Archive, 2007 | 72 | 2007 |
Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks S Gilbert, R Guerraoui, C Newport International Conference On Principles Of Distributed Systems, 215-229, 2006 | 67 | 2006 |
Mapping physician Twitter networks: describing how they work as a first step in understanding connectivity, information flow, and message diffusion R Mishori, LO Singh, B Levy, C Newport Journal of medical Internet research 16 (4), e3006, 2014 | 64 | 2014 |
Broadcast in the ad hoc SINR model S Daum, S Gilbert, F Kuhn, C Newport Distributed Computing: 27th International Symposium, DISC 2013, Jerusalem …, 2013 | 62 | 2013 |
Broadcasting in unreliable radio networks F Kuhn, N Lynch, C Newport, R Oshman, A Richa Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of …, 2010 | 61 | 2010 |
The virtual node layer: A programming abstraction for wireless sensor networks M Brown, S Gilbert, N Lynch, C Newport, T Nolte, M Spindel ACM SIGBED Review 4 (3), 7-12, 2007 | 58 | 2007 |
Empirical validation of wireless models in simulations of ad hoc routing protocols J Liu, Y Yuan, DM Nicol, RS Gray, CC Newport, D Kotz, LF Perrone Simulation 81 (4), 307-323, 2005 | 51 | 2005 |
The wireless synchronization problem S Dolev, S Gilbert, R Guerraoui, F Kuhn, C Newport Proceedings of the 28th ACM symposium on Principles of distributed computing …, 2009 | 50 | 2009 |