Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Anatomy of Clickbot.A., and . HotBots, USENIX Association, (2007)Maximizing Remote Work in Flooding-Based Peer-to-Peer Systems., , and . DISC, volume 2848 of Lecture Notes in Computer Science, page 337-351. Springer, (2003)Experimenting with Electronic Commerce on the PalmPilot., and . Financial Cryptography, volume 1648 of Lecture Notes in Computer Science, page 1-16. Springer, (1999)Denial-of-service (DoS) attacks and commerce infrastructure in peer-to-peer networks.. Stanford University, USA, (2005)Pong-cache poisoning in GUESS., and . CCS, page 98-109. ACM, (2004)Open Problems in Data-Sharing Peer-to-Peer Systems., , and . ICDT, volume 2572 of Lecture Notes in Computer Science, page 1-15. Springer, (2003)Authenticity and availability in PIPE networks., , , , and . Future Gener. Comput. Syst., 21 (3): 391-400 (2005)Peer-to-peer research at Stanford., , , , , , , , , and 2 other author(s). SIGMOD Record, 32 (3): 23-28 (2003)Query-flood DoS attacks in gnutella., and . ACM Conference on Computer and Communications Security, page 181-192. ACM, (2002)