Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Characterizing the HTTPS Trust Landscape: A Passive View from the Edge., , , and . IEEE Communications Magazine, 55 (7): 36-42 (2017)Delay Performance of a Two-User Broadcast Channel with Security Constraints., , , and . GIIS, page 1-5. IEEE, (2018)Delta Encoding Overhead Analysis of Cloud Storage Systems Using Client-Side Encryption., and . CloudCom, page 183-190. IEEE, (2019)Collaborative framework for protection against attacks targeting BGP and edge networks., , and . Comput. Networks, (2017)Characterizing the file hosting ecosystem: A view from the edge., , , , and . Perform. Evaluation, 68 (11): 1085-1102 (2011)Caching in the Clouds: Optimized Dynamic Cache Instantiation in Content Delivery Systems., and . CoRR, (2018)The Untold Story of the Clones: Content-agnostic Factors that Impact YouTube Video Popularity., , , , and . CoRR, (2013)Peer-Assisted On-Demand Streaming of Stored Media Using BitTorrent-Like Protocols., and . Networking, volume 4479 of Lecture Notes in Computer Science, page 570-581. Springer, (2007)Ambient Interference Effects in Wi-Fi Networks., , , and . Networking, volume 6091 of Lecture Notes in Computer Science, page 160-173. Springer, (2010)Server selection in large-scale video-on-demand systems., and . ACM Trans. Multim. Comput. Commun. Appl., 6 (1): 1:1-1:26 (2010)