Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Searching for Rare Objects Using Index Replication., , and . INFOCOM, page 1723-1731. IEEE, (2008)Docx2Go: collaborative editing of fidelity reduced documents on mobile devices., , , , , and . MobiSys, page 345-356. ACM, (2010)Silverline: toward data confidentiality in storage-intensive cloud applications., , and . SoCC, page 10. ACM, (2011)Preserving privacy in location-based mobile social applications., and . HotMobile, page 1-6. ACM, (2010)Preserving Location Privacy in Geosocial Applications., , , , , , and . IEEE Trans. Mob. Comput., 13 (1): 159-173 (2014)User interactions in social networks and their implications., , , , and . EuroSys, page 205-218. ACM, (2009)Protecting cloud data using dynamic inline fingerprint checks., , , and . INFOCOM, page 2877-2885. IEEE, (2013)Lowering Inter-datacenter Bandwidth Costs via Bulk Data Scheduling., and . CCGRID, page 244-251. IEEE Computer Society, (2012)To Rent or to Buy in the Presence of Statistical Information: The Constrained Ski-Rental Problem., , and . IEEE/ACM Trans. Netw., 23 (4): 1067-1077 (2015)Anonygator: Privacy and Integrity Preserving Data Aggregation., , and . Middleware, volume 6452 of Lecture Notes in Computer Science, page 85-106. Springer, (2010)