From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure network provenance., , , , , и . SOSP, стр. 295-310. ACM, (2011)Having your cake and eating it too: routing security with privacy protections., , , , и . HotNets, стр. 15. ACM, (2011)Formally Verifiable Networking., , , , , и . HotNets, ACM SIGCOMM, (2009)The Case for a Hybrid P2P Search Infrastructure., , , и . IPTPS, том 3279 из Lecture Notes in Computer Science, стр. 141-150. Springer, (2004)Complex Queries in DHT-based Peer-to-Peer Networks., , , , , и . IPTPS, том 2429 из Lecture Notes in Computer Science, стр. 242-259. Springer, (2002)Declarative Networking., и . Encyclopedia of Database Systems (2nd ed.), Springer, (2018)Scalable and Anonymous Group Communication with MTor., , и . Proc. Priv. Enhancing Technol., 2016 (2): 22-39 (2016)NetEgg: A Scenario-Based Programming Toolkit for SDN Policies., , , , , , и . IEEE/ACM Trans. Netw., 26 (5): 2104-2117 (2018)Saguaro: Efficient Processing of Transactions in Wide Area Networks using a Hierarchical Permissioned Blockchain., , , , , и . CoRR, (2021)Distributed Time-aware Provenance., , , , , , , и . Proc. VLDB Endow., 6 (2): 49-60 (2012)