Author of the publication

Multipath TCP traffic diversion attacks and countermeasures.

, , , , and . ICNP, page 1-10. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A template approach to group key establishment in dynamic ad-hoc groups., , , and . ICNP, page 1-2. IEEE Computer Society, (2016)A stochastic frame based approach to RFID tag searching., , and . Networking, page 153-161. IEEE Computer Society, (2016)Understanding and Modeling of WiFi Signal Based Human Activity Recognition., , , , and . MobiCom, page 65-76. ACM, (2015)Device-free gesture tracking using acoustic signals: demo., , and . MobiCom, page 497-498. ACM, (2016)An Energy-Aware Virtual Machine Scheduling Method for Cloudlets in Wireless Metropolitan Area Networks., , , , , , and . iThings/GreenCom/CPSCom/SmartData, page 517-523. IEEE, (2018)A De-compositional Approach to Regular Expression Matching for Network Security Applications., and . ICDCS, page 680-689. IEEE Computer Society, (2016)Privacy Preserving String Matching for Cloud Computing., , , , and . ICDCS, page 609-618. IEEE Computer Society, (2015)A Model of Stateful Firewalls and Its Properties., and . DSN, page 128-137. IEEE Computer Society, (2005)Adaptively Secure Conjunctive Query Processing over Encrypted Data for Cloud Computing., and . ICDE, page 697-708. IEEE Computer Society, (2017)Breaching IM session privacy using causality., , , , , , , , and . GLOBECOM, page 686-691. IEEE, (2014)