Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rendezvous tunnel for anonymous publishing., , , , and . ACM Conference on Computer and Communications Security, page 690-692. ACM, (2010)Avoidance of misbehaving nodes in wireless mesh networks., , and . Secur. Commun. Networks, 7 (7): 1096-1114 (2014)Crankback prediction in hierarchical ATM networks., , and . J. Netw. Syst. Manag., 10 (3): 327-355 (2002)Distributed flow detection over multi-path sessions., , , and . Comput. Commun., 33 (7): 816-827 (2010)Crankback Prediction in Hierarchical ATM Networks., , and . INFOCOM, page 671-679. IEEE Computer Society, (1999)Framework for Multicast in Hierarchical Networks., , and . INFOCOM, page 1673-1682. IEEE Computer Society, (2000)Distributed flow detection over multi path sessions., , , and . SecureComm, page 3. ACM, (2008)A policy framework for integrated and differentiated services in the Internet., , , , and . IEEE Netw., 13 (5): 36-41 (1999)Scalable routing in hierarchical ATM networks.. Technion - Israel Institute of Technology, Israel, (2002)Anonymity Scheme for Interactive P2P Services., , , and . CCGRID, page 33-40. IEEE Computer Society, (2008)