Author of the publication

Assessing the security of a clean-slate Internet architecture.

, , , and . ICNP, page 1-6. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PreDA: Predicate Routing for DTN Architectures over MANET., and . GLOBECOM, page 1-6. IEEE, (2009)Fast time-dependent evaluation of multi-service networks., and . Computer Networks and ISBN Systems, 29 (17-18): 1999-2019 (1998)On the origin of power laws in Internet topologies., , and . Comput. Commun. Rev., 30 (2): 18-28 (2000)Scheduling and bandwidth allocation for the distribution of archived video in VOD systems., , and . Telecommun. Syst., 9 (3-4): 335-355 (1998)Multi-layer Virtual Transport Network Design., and . J. Netw. Syst. Manag., 26 (3): 755-789 (2018)Reduction of Quality (RoQ) Attacks on Dynamic Load Balancers: Vulnerability Assessment and Design Tradeoffs., , , and . INFOCOM, page 857-865. IEEE, (2007)Bounding the router table size in an ISP network using RINA., , , , , , , , and . NOF, page 57-61. IEEE, (2011)Distributed Selfish Caching., , , , and . IEEE Trans. Parallel Distributed Syst., 18 (10): 1361-1376 (2007)On the impact of seed scheduling in peer-to-peer networks., , , and . Comput. Networks, 55 (15): 3303-3317 (2011)Corrections to "How Does TCP Generate Pseudo-Self-Similarity?"., , and . Comput. Commun. Rev., 32 (2): 30 (2002)