Author of the publication

Authentication in Stealth Distributed Hash Tables.

, , , , and . EUROMICRO-SEAA, page 348-355. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multimodal QoE evaluation in P2P-based IPTV systems., , , , and . ACM Multimedia, page 1321-1324. ACM, (2011)Evaluating the Real-World Performance of 5G Fixed Wireless Broadband in Rural Areas., , , and . 5G World Forum, page 465-470. IEEE, (2019)Safe and Secure Software-Defined Networks for Smart Electricity Substations., , , , and . ACIIDS (Companion), volume 1178 of Communications in Computer and Information Science, page 179-191. Springer, (2020)Just Browsing?: Understanding User Journeys in Online TV., , , and . ACM Multimedia, page 965-968. ACM, (2014)λBGP: Rethinking BGP programmability., , , , and . NOMS, page 1-9. IEEE, (2020)P2P-Based IPTV Services: Design, Deployment, and QoE Measurement., , , , , , and . IEEE Trans. Multim., 14 (6): 1515-1527 (2012)Understanding Your Needs: An Adaptive VoD System., , and . ISM, page 255-260. IEEE Computer Society, (2012)Baguette: Towards End-to-End Service Orchestration in Heterogeneous Networks., , , , , , , , , and 2 other author(s). IUCC-CSS, page 196-203. IEEE Computer Society, (2016)Demo: introducing NextSharemobile, an interactive second screen application., , , , and . MobiSys, page 489-490. ACM, (2012)It Bends But Would It Break? Topological Analysis of BGP Infrastructures in Europe., , , , , , and . EuroS&P, page 423-438. IEEE, (2016)