Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward efficient data access privacy in the cloud.. IEEE Communications Magazine, 51 (11): 39-45 (2013)Understanding the effects of P2P dynamics on trust bootstrapping., and . Inf. Sci., (2013)On the FaaS Track: Building Stateful Distributed Applications with Serverless Architectures., , , , and . Middleware, page 41-54. ACM, (2019)eSciGrid: A P2P-based e-science Grid for scalable and efficient data sharing., and . Future Gener. Comput. Syst., 26 (5): 704-719 (2010)Architecture and evaluation of a unified V2V and V2I communication system based on cellular networks., , and . Comput. Commun., 31 (12): 2850-2861 (2008)FRIENDBOX: A cloudified F2F storage application., , , and . P2P, page 75-76. IEEE, (2012)Evaluation of P2P Systems under Different Churn Models: Why We Should Bother., and . Euro-Par (1), volume 6852 of Lecture Notes in Computer Science, page 541-553. Springer, (2011)Pace: Privacy-Protection for Access Control Enforcement in P2P Networks., and . Globe, volume 5697 of Lecture Notes in Computer Science, page 99-111. Springer, (2009)IOStack: Software-Defined Object Storage., , , , , , , , , and 1 other author(s). IEEE Internet Comput., 20 (3): 10-18 (2016)A Novel Methodology for Constructing Secure Multipath Overlays., , and . IEEE Internet Comput., 9 (6): 50-57 (2005)