Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient and Resilient Backbones for Multihop Wireless Networks., , , and . IEEE Trans. Mob. Comput., 7 (11): 1349-1362 (2008)SeCloak: ARM Trustzone-based Mobile Peripheral Control., , , and . CoRR, (2020)Privacy-preserving microbiome analysis using secure computation., , , , and . Bioinform., 32 (12): 1873-1879 (2016)What a mesh: understanding the design tradeoffs for streaming multicast., , and . SIGMETRICS Perform. Evaluation Rev., 37 (2): 85-86 (2009)Scalable secure group communication over IP multicast., and . IEEE J. Sel. Areas Commun., 20 (8): 1511-1527 (2002)Persona: an online social network with user-defined privacy., , , , and . SIGCOMM, page 135-146. ACM, (2009)Composing Abstractions using the null-Kernel., , , and . HotOS, page 1-6. ACM, (2019)OMNI: An efficient overlay multicast infrastructure for real-time applications., , , , and . Comput. Networks, 50 (6): 826-841 (2006)Brave New World: Privacy Risks for Mobile Users., , , , and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 18 (3): 49-54 (2014)Finding Safety in Numbers with Secure Allegation Escrows., , , , and . NDSS, The Internet Society, (2020)