Author of the publication

MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming.

, , , and . INFOCOM, page 296-300. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CensorSpoofer: Asymmetric Communication with IP Spoofing for Censorship-Resistant Web Browsing, , , , and . CoRR, (2012)Research on target detection method of underwater robot in low illumination environment., , , , and . Multim. Tools Appl., 82 (17): 26511-26525 (July 2023)COADA: Leveraging Dynamic Coalition Peer-to-Peer Network for Adaptive Content Download of Cellular Users., , , and . Int. J. Adapt. Resilient Auton. Syst., 2 (2): 1-22 (2011)In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems., , and . ACM Conference on Computer and Communications Security, page 308-318. ACM, (2010)An Old Story Retold: Loss of G1 Control Defines A Distinct Genomic Subtype of Esophageal Squamous Cell Carcinoma., , , , , , , , , and 8 other author(s). Genom. Proteom. Bioinform., 13 (4): 258-270 (2015)Time Valid One-Time Signature for Time-Critical Multicast Data Authentication., , , and . INFOCOM, page 1233-1241. IEEE, (2009)rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation., , , and . NDSS, The Internet Society, (2013)MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming., , , and . INFOCOM, page 296-300. IEEE, (2010)VeCure: A practical security framework to protect the CAN bus of vehicles., and . IOT, page 13-18. IEEE, (2014)Robust censorship-resistant communication. University of Illinois Urbana-Champaign, USA, (2013)