Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Overcoming fragmentation in mobile Ad Hoc networks., and . J. Commun. Networks, 2 (3): 182-187 (2000)Protecting Privacy during a Pandemic Outbreak., , , , and . ICISSP, page 308-318. SCITEPRESS, (2021)Automatically deducing propagation sequences that circumvent a collaborative worm defense., and . IPCCC, IEEE, (2006)Pathway Logic Helping Biologists Understand and Organize Pathway Information., , , , , , and . CSB Workshops, page 155-156. IEEE Computer Society, (2005)StegoTorus: a camouflage proxy for the Tor anonymity system., , , , , , and . CCS, page 109-120. ACM, (2012)Epidemic profiles and defense of scale-free networks., , and . WORM, page 67-75. ACM Press, (2003)A Rewriting Logic Framework for Soft Constraints., , , , and . WRLA, volume 176 of Electronic Notes in Theoretical Computer Science, page 181-197. Elsevier, (2006)JumpBox - A Seamless Browser Proxy for Tor Pluggable Transports., , , and . SecureComm (1), volume 152 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 563-581. Springer, (2014)Role-based multicast in highly mobile but sparsely connected ad hoc networks., and . MobiHoc, page 45-50. IEEE, (2000)Research Report: The Parsley Data Format Definition Language., , , , , , and . SP (Workshops), page 300-307. IEEE, (2020)