Author of the publication

Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures.

, , , , and . IEEE Trans. Dependable Secur. Comput., 12 (6): 675-687 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SODA: Towards a Framework for Self Optimization via Demand Adaptation in Peer-to-Peer Networks., , and . Peer-to-Peer Computing, page 163-170. IEEE, (2009)A software defined approach to unified IPv6 transition, , , , , and . Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, page 547--548. New York, NY, USA, ACM, (2013)Go this way: navigation for better access quality in mobile networks., and . MobiArch@MobiCom, page 41-46. ACM, (2013)Scale content centric networks via reactive routing., , and . ICC, page 3530-3535. IEEE, (2013)μ DC2: unified data collection for data centers., , , and . J. Supercomput., 70 (3): 1383-1404 (2014)Simplified Representation Learning Model Based on Parameter-Sharing for Knowledge Graph Completion., , , and . CCIR, volume 11772 of Lecture Notes in Computer Science, page 67-78. Springer, (2019)TECC: Towards collaborative in-network caching guided by traffic engineering., , and . INFOCOM, page 2546-2550. IEEE, (2012)Calantha: Content distribution across geo-distributed datacenters., , , , and . INFOCOM Workshops, page 724-729. IEEE, (2017)Time-aware Path Reasoning on Knowledge Graph for Recommendation., , , , , , and . CoRR, (2021)EPI-CGAN: Robust EEG-based Person Identification Using Conditional Generative Adversarial Network., , , , and . IJCB, page 1-9. IEEE, (2022)