Author of the publication

Agent societies and social networks for ubiquitous computing.

, , and . Personal and Ubiquitous Computing, 17 (8): 1667-1669 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Agent societies and social networks for ubiquitous computing., , and . Personal and Ubiquitous Computing, 17 (8): 1667-1669 (2013)BotTorrent: Misusing BitTorrent to Launch DDoS Attacks, , and . Proceedings of USENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI) '07, Santa Clara, CA, (June 2007)Incentive-based cooperative and secure inter-personal networking., , and . MobiOpp@MobiSys, page 57-61. ACM, (2007)BotTorrent: Misusing BitTorrent to Launch DDoS Attacks., and . SRUTI, USENIX Association, (2007)Disincentivizing/Incentivizing Malicious/Honest Behavior on the Internet via Privacy-Preserving Appcoins., and . ICNP, page 630-635. IEEE Computer Society, (2014)Founding Digital Currency on Secure Computation., and . ACM Conference on Computer and Communications Security, page 1-14. ACM, (2014)Automated Inference of Dependencies of Network Services and Applications via Transfer Entropy., , and . COMPSAC Workshops, page 32-37. IEEE Computer Society, (2016)978-1-4673-8845-0.Byzantine Fault Tolerant Software-Defined Networking (SDN) Controllers., and . COMPSAC Workshops, page 208-213. IEEE Computer Society, (2016)978-1-4673-8845-0.Privacy-Preserving Location-Based On-Demand Routing in MANETs., and . IEEE J. Sel. Areas Commun., 29 (10): 1926-1934 (2011)Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks., , and . COMPSAC (1), page 271-279. IEEE Computer Society, (2009)