Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting personally identifiable information transmission in android applications using light-weight static analysis., , and . Comput. Secur., (2020)Efficient Content Location Using Interest-Based Locality in Peer-to-Peer Systems., , and . INFOCOM, page 2166-2176. IEEE Computer Society, (2003)Distributing streaming media content using cooperative networking., , , and . NOSSDAV, page 177-186. ACM, (2002)Considering Priority in Overlay Multicast Protocols Under Heterogeneous Environments., , and . INFOCOM, IEEE, (2006)The feasibility of supporting large-scale live streaming applications with dynamic application end-points., , , and . SIGCOMM, page 107-120. ACM, (2004)Reducing Smart Contract Runtime Errors on Ethereum., and . IEEE Softw., 37 (4): 55-59 (2020)The Case for Cooperative Networking., and . IPTPS, volume 2429 of Lecture Notes in Computer Science, page 178-190. Springer, (2002)IoT-VuLock: Locking IoT Device Vulnerability with Enhanced Network Scans., , , and . IMCOM, volume 935 of Advances in Intelligent Systems and Computing, page 225-233. Springer, (2019)Comprehensive Detection of Vulnerable Personal Information Leaks in Android Applications., , and . INFOCOM Workshops, page 121-126. IEEE, (2020)Enabling efficient content location and retrieval in peer-to-peer systems by exploiting locality in interests., , and . Comput. Commun. Rev., 32 (1): 80 (2002)