Author of the publication

Locating Prefix Hijackers using LOCK.

, , , , , and . USENIX Security Symposium, page 135-150. USENIX Association, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

When should we surf the mobile web using both wifi and cellular?, , and . ATC@MobiCom, page 7-12. ACM, (2016)Geospatial and Temporal Dynamics of Application Usage in Cellular Data Networks., , , , and . IEEE Trans. Mob. Comput., 14 (7): 1369-1381 (2015)Understanding the impact of network dynamics on mobile video user engagement., , , , , and . SIGMETRICS, page 367-379. ACM, (2014)Are all bits equal?: experimental study of IEEE 802.11 communication bit errors., , , , and . IEEE/ACM Trans. Netw., 20 (6): 1695-1706 (2012)Channel Access Throttling for Improving WLAN QoS., , , , and . SECON, page 1-9. IEEE, (2009)Maranello: Practical Partial Packet Recovery for 802.11., , , , , , , , and . NSDI, page 205-218. USENIX Association, (2010)TowerDefense: Deployment strategies for battling against IP prefix hijacking., , , , and . ICNP, page 134-143. IEEE Computer Society, (2010)An anatomy of mobile web performance over multipath TCP., , , and . CoNEXT, page 5:1-5:7. ACM, (2015)Wireless Wallet., , , , and . MobiQuitous, page 32-41. IEEE Computer Society, (2004)An Information Notification Model with VPC on KODAMA in an Ubiquitous Computing Environment, and Its Experiment., , , , , , and . CIA, volume 2782 of Lecture Notes in Computer Science, page 30-45. Springer, (2003)