From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hybrid reliable multicast with TCP-XM., , , и . CoNEXT, стр. 177-187. ACM, (2005)No more backups: Toward efficient embedding of survivable virtual networks., , , , , , и . ICC, стр. 2128-2132. IEEE, (2013)Identity management based on adaptive puzzles to protect P2P systems from Sybil attacks., , , , и . Comput. Networks, 56 (11): 2569-2589 (2012)A toolset for efficient privacy-oriented virtual network embedding and its instantiation on SDN/OpenFlow-based substrates., , , , и . Comput. Commun., (2016)Flexible and secure service discovery in ubiquitous computing., , и . J. Netw. Comput. Appl., 33 (2): 128-140 (2010)A conservative strategy to protect P2P file sharing systems from pollution attacks., , , и . Concurr. Comput. Pract. Exp., 23 (1): 117-141 (2011)Dynamic Property Enforcement in Programmable Data Planes., , , и . Networking, стр. 1-9. IEEE, (2019)Edge-centric Computing: Vision and Challenges., , , , , , , , и . Comput. Commun. Rev., 45 (5): 37-42 (2015)Tá na Hora: analisando a latência de modificação de tabelas de fluxo em arquiteturas de switches SDN., , , и . SBRC, стр. 1033-1046. (2018)No Doppelgänger: Advancing Mobile Networks Against Impersonation in Adversarial Scenarios., , и . WISEC, стр. 280-281. ACM, (2022)