Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Private Techniques for Verifying Social Proximity., and . IPTPS, (2007)From Feast to Famine: Managing Mobile Network Resources Across Environments and Preferences., , and . TRIOS, USENIX Association, (2014)SANE: a protection architecture for enterprise networks, , , , , , and . Proceedings of the 15th conference on USENIX Security Symposium - Volume 15, Berkeley, CA, USA, (2006)Scaling Virtual Worlds with a Physical Metaphor., , , , and . IEEE Pervasive Computing, 8 (3): 50-54 (2009)Scalable flow-based networking with DIFANE., , , and . SIGCOMM, page 351-362. ACM, (2010)Ravana: controller fault-tolerance in software-defined networking., , , and . SOSR, page 4:1-4:12. ACM, (2015)A Scalable Server for 3D Metaverses., , , , , , and . USENIX Annual Technical Conference, page 209-222. USENIX Association, (2012)EnclaveDom: Privilege Separation for Large-TCB Applications in Trusted Execution Environments., , and . CoRR, (2019)Unsupervised Conversion of 3D Models for Interactive Metaverses., , , and . ICME, page 902-907. IEEE Computer Society, (2012)The Free Haven Project: Reputation, , and . (2002)