Author of the publication

VIP delegation: Enabling VIPs to offload data in wireless social mobile networks.

, , , , and . DCOSS, page 1-8. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data offloading in social mobile networks through VIP delegation., , , and . Ad Hoc Networks, (2014)To offload or not to offload? The bandwidth and energy costs of mobile cloud computing., , , and . INFOCOM, page 1285-1293. IEEE, (2013)Personal Marks and Community Certificates: Detecting Clones in Mobile Wireless Networks of Smart-Phones, and . CoRR, (2011)VIP delegation: Enabling VIPs to offload data in wireless social mobile networks., , , , and . DCOSS, page 1-8. IEEE Computer Society, (2011)Signals from the crowd: uncovering social relationships through smartphone probes., , , , and . Internet Measurement Conference, page 265-276. ACM, (2013)Mobile offloading in the wild: Findings and lessons learned through a real-life experiment with a new cloud-aware system., , , , and . INFOCOM, page 2355-2363. IEEE, (2014)Personal Marks and Community Certificates: Detecting Clones in Wireless Mobile Social Networks., and . DCOSS, page 83-91. IEEE Computer Society, (2012)On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records., , , , and . PAM, volume 8362 of Lecture Notes in Computer Science, page 247-257. Springer, (2014)Exploiting Delay Patterns for User IPs Identification in Cellular Networks., , and . Privacy Enhancing Technologies, volume 8555 of Lecture Notes in Computer Science, page 224-243. Springer, (2014)CellFlood: Attacking Tor Onion Routers on the Cheap., , , and . ESORICS, volume 8134 of Lecture Notes in Computer Science, page 664-681. Springer, (2013)