Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting information centric networking to build an attacker-controlled content delivery network., , , and . Med-Hoc-Net, page 1-6. IEEE, (2015)On the Tradeoff between Performance and User Privacy in Information Centric Networking., and . NTMS, page 1-5. IEEE, (2014)Optimal Content Prefetching in NDN Vehicle-to-Infrastructure Scenario., , , , and . IEEE Trans. Vehicular Technology, 66 (3): 2513-2525 (2017)ICN based shared caching in future converged fixed and mobile network., , , , , , and . HPSR, page 251-256. IEEE, (2015)Analysis of security issues in information centric networking.. Polytechnic University of Milan, Italy, (2016)A protocol for metering data pseudonymization in smart grids., , and . Trans. Emerg. Telecommun. Technol., 26 (5): 876-892 (2015)A data pseudonymization protocol for Smart Grids., , and . OnlineGreenComm, page 68-73. IEEE, (2012)Distributing Key Revocation Status in Named Data Networking., and . EUNICE, volume 8115 of Lecture Notes in Computer Science, page 310-313. Springer, (2013)Up-to-date key retrieval for information centric networking., and . Comput. Networks, (2017)Optimal content placement in ICN vehicular networks., , , , and . NOF, page 1-5. IEEE, (2014)