Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-preserving microbiome analysis using secure computation., , , , and . Bioinform., 32 (12): 1873-1879 (2016)What a mesh: understanding the design tradeoffs for streaming multicast., , and . SIGMETRICS Perform. Evaluation Rev., 37 (2): 85-86 (2009)Efficient and Resilient Backbones for Multihop Wireless Networks., , , and . IEEE Trans. Mob. Comput., 7 (11): 1349-1362 (2008)SeCloak: ARM Trustzone-based Mobile Peripheral Control., , , and . CoRR, (2020)Scalable secure group communication over IP multicast., and . IEEE J. Sel. Areas Commun., 20 (8): 1511-1527 (2002)Persona: an online social network with user-defined privacy., , , , and . SIGCOMM, page 135-146. ACM, (2009)Brave New World: Privacy Risks for Mobile Users., , , , and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 18 (3): 49-54 (2014)OMNI: An efficient overlay multicast infrastructure for real-time applications., , , , and . Comput. Networks, 50 (6): 826-841 (2006)Composing Abstractions using the null-Kernel., , , and . HotOS, page 1-6. ACM, (2019)Finding Safety in Numbers with Secure Allegation Escrows., , , , and . NDSS, The Internet Society, (2020)