Author of the publication

The TrustedFlow (TM) Protocol-Idiosyncratic Signatures for Authenticated Execution.

, , and . IAW, page 288-291. IEEE, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simulation-based verification of network protocols performance., , , , , and . CHARME, volume 105 of IFIP Conference Proceedings, page 236-251. Chapman & Hall, (1997)Software Process Model Specification., and . Software Quality and Productivity, volume 3 of IFIP Conference Proceedings, page 149-155. Chapman & Hall, (1994)GOM-Hadoop: A distributed framework for efficient analytics on ordered datasets., , , , and . J. Parallel Distributed Comput., (2015)CrowdSurf: Empowering Transparency in the Web., , , , and . Comput. Commun. Rev., 45 (5): 5-12 (2015)Time Driven Priority Router Implementation and First Experiments., , , , , and . ICC, page 897-902. IEEE, (2006)An Efficient Scheduling Algorithm for Time-Driven Switching Networks., , and . LANMAN, page 90-95. IEEE, (2007)Lightweight, Payload-Based Traffic Classification: An Experimental Evaluation., , , , and . ICC, page 5869-5875. IEEE, (2008)Providing End-to-End Connectivity to SIP User Agents Behind NATs., , , and . ICC, page 5902-5908. IEEE, (2008)The Online Tracking Horde: A View from Passive Measurements., , , , and . TMA, volume 9053 of Lecture Notes in Computer Science, page 111-125. Springer, (2015)On Understanding User Interests through Heterogeneous Data Sources., , , , and . PAM, volume 8362 of Lecture Notes in Computer Science, page 272-274. Springer, (2014)