Author of the publication

Reputation based approach for improved fairness and robustness in P2P protocols.

, , and . Peer-to-Peer Netw. Appl., 12 (4): 951-968 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reputation-Based Security System For Edge Computing., , and . ARES, page 39:1-39:8. ACM, (2018)Towards a Modular On-Premise Approach for Data Sharing., , , , and . Sensors, 21 (17): 5805 (2021)Skynet: a Cyber-Aware Intrusion Tolerant Overseer., , , and . DSN-S, page 111-116. IEEE, (2023)Container Hardening Through Automated Seccomp Profiling., , , , and . WOC@Middleware, page 31-36. ACM, (2020)Employment of Secure Enclaves in Cheat Detection Hardening., , and . TrustBus, volume 12395 of Lecture Notes in Computer Science, page 48-62. Springer, (2020)Using Edge-Clouds to Reduce Load on Traditional WiFi Infrastructures and Improve Quality of Experience., , , , , and . ICFEC, page 61-67. IEEE Computer Society, (2017)Short paper: CHIPS: content-based heuristics for improving photo privacy for smartphones., , , , and . WISEC, page 213-218. ACM, (2014)A Survey on Using Kolmogorov Complexity in Cybersecurity., , and . Entropy, 21 (12): 1196 (2019)Secure Provisioning for Achieving End-to-End Secure Communications., , , and . ADHOC-NOW, volume 11803 of Lecture Notes in Computer Science, page 498-507. Springer, (2019)Deterministic or probabilistic? - A survey on Byzantine fault tolerant state machine replication., , , and . Comput. Secur., (June 2023)