Author of the publication

A Model to Quantify the Success of a Sybil Attack Targeting RELOAD/Chord Resources.

, , , and . IEEE Commun. Lett., 17 (2): 428-431 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrated security infrastructures for law enforcement agencies., , , , and . Multim. Tools Appl., 74 (12): 4453-4468 (2015)INDECT Advanced Security Requirements, , , , and . CoRR, (2010)A Bloom Filter-Based Monitoring Station for a Lawful Interception Platform., , , and . MCSS, volume 429 of Communications in Computer and Information Science, page 214-228. Springer, (2014)Effect of content popularity, number of contents and a cellular backup network on the performance of content distribution protocols in urban VANET scenarios., , , and . Comput. Commun., (2017)LWESP: Light-Weight Exterior Sensornet Protocol., , , and . ISCC, page 913-919. IEEE Computer Society, (2009)Experimental Evaluation of the ETSI DCC Adaptive Approach and Related Algorithms., , , and . CoRR, (2024)An empirical study of Cloud Gaming., , , and . NetGames, page 1-2. IEEE, (2012)Modelling data-aggregation in multi-replication data centric storage systems for wireless sensor and actor networks., , , and . IET Commun., 5 (12): 1669-1681 (2011)Experimental Evaluation of the ETSI DCC Adaptive Approach and Related Algorithms., , , and . IEEE Access, (2020)STARR-DCS: Spatio-temporal adaptation of random replication for data-centric storage., , , and . ACM Trans. Sens. Networks, 10 (1): 14:1-14:37 (2013)