Author of the publication

Performance considerations of network functions virtualization using containers.

, , , , , and . ICNC, page 1-7. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Universally composable zero-knowledge sets., , and . Int. J. Grid Util. Comput., 3 (1): 25-31 (2012)Multi-Hop Unidirectional Proxy Re-Encryption from Multilinear Maps., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (2): 762-766 (2015)Round-optimal zero-knowledge proofs of knowledge for NP., , , and . Sci. China Inf. Sci., 55 (11): 2473-2484 (2012)Cybersecurity Attacks in Vehicle-to-Infrastructure (V2I) Applications and their Prevention., , , and . CoRR, (2017)Threatening Patch Attacks on Object Detection in Optical Remote Sensing Images., , , , and . CoRR, (2023)Leakage-Resilient Zero-Knowledge Proofs of Knowledge for NP., , and . NSS, volume 7873 of Lecture Notes in Computer Science, page 365-380. Springer, (2013)Understanding and Detecting Remote Infection on Linux-based IoT Devices., , , , , , and . AsiaCCS, page 873-887. ACM, (2022)On the Safety and Efficiency of Virtual Firewall Elasticity Control., , , , , , and . NDSS, The Internet Society, (2017)When NFV Meets ANN: Rethinking Elastic Scaling for ANN-based NFs., , , , , , and . ICNP, page 1-6. IEEE, (2019)Attribute-Based Signatures for Circuits from Multilinear Maps., , and . ISC, volume 8783 of Lecture Notes in Computer Science, page 54-71. Springer, (2014)