From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Agent societies and social networks for ubiquitous computing., , и . Personal and Ubiquitous Computing, 17 (8): 1667-1669 (2013)BotTorrent: Misusing BitTorrent to Launch DDoS Attacks, , и . Proceedings of USENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI) '07, Santa Clara, CA, (июня 2007)Incentive-based cooperative and secure inter-personal networking., , и . MobiOpp@MobiSys, стр. 57-61. ACM, (2007)BotTorrent: Misusing BitTorrent to Launch DDoS Attacks., и . SRUTI, USENIX Association, (2007)Disincentivizing/Incentivizing Malicious/Honest Behavior on the Internet via Privacy-Preserving Appcoins., и . ICNP, стр. 630-635. IEEE Computer Society, (2014)Founding Digital Currency on Secure Computation., и . ACM Conference on Computer and Communications Security, стр. 1-14. ACM, (2014)Automated Inference of Dependencies of Network Services and Applications via Transfer Entropy., , и . COMPSAC Workshops, стр. 32-37. IEEE Computer Society, (2016)978-1-4673-8845-0.Byzantine Fault Tolerant Software-Defined Networking (SDN) Controllers., и . COMPSAC Workshops, стр. 208-213. IEEE Computer Society, (2016)978-1-4673-8845-0.Privacy-Preserving Location-Based On-Demand Routing in MANETs., и . IEEE J. Sel. Areas Commun., 29 (10): 1926-1934 (2011)Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks., , и . COMPSAC (1), стр. 271-279. IEEE Computer Society, (2009)