Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient and Resilient Backbones for Multihop Wireless Networks., , , and . IEEE Trans. Mob. Comput., 7 (11): 1349-1362 (2008)Scalable secure group communication over IP multicast., and . IEEE J. Sel. Areas Commun., 20 (8): 1511-1527 (2002)Privacy-preserving microbiome analysis using secure computation., , , , and . Bioinform., 32 (12): 1873-1879 (2016)SeCloak: ARM Trustzone-based Mobile Peripheral Control., , , and . CoRR, (2020)What a mesh: understanding the design tradeoffs for streaming multicast., , and . SIGMETRICS Perform. Evaluation Rev., 37 (2): 85-86 (2009)Persona: an online social network with user-defined privacy., , , , and . SIGCOMM, page 135-146. ACM, (2009)Composing Abstractions using the null-Kernel., , , and . HotOS, page 1-6. ACM, (2019)OMNI: An efficient overlay multicast infrastructure for real-time applications., , , , and . Comput. Networks, 50 (6): 826-841 (2006)Brave New World: Privacy Risks for Mobile Users., , , , and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 18 (3): 49-54 (2014)IP geolocation in metropolitan areas., , , , , and . SIGMETRICS, page 155-156. ACM, (2011)