Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Concurrent Wi-Fi for mobile users: analysis and measurements., , , , , and . CoNEXT, page 4. ACM, (2011)A retrospective look at the UMass DOME mobile testbed., , , , and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 15 (4): 2-15 (2011)Spider: improving mobile networking with concurrent wi-fi connections., , , , , and . SIGCOMM, page 402-403. ACM, (2011)DOME: a diverse outdoor mobile testbed., , , , , and . HotPlanet@MobiSys, page 2. ACM, (2009)Measurement and analysis of child pornography trafficking on P2P networks., , , , , , , , , and . WWW, page 631-642. International World Wide Web Conferences Steering Committee / ACM, (2013)SCIBORG: Secure Configurations for the IoT Based on optimization and Reasoning on Graphs., , , , , , , , and . CNS, page 1-10. IEEE, (2020)HYMAC: Hybrid TDMA/FDMA Medium Access Control Protocol for Wireless Sensor Networks., , and . PIMRC, page 1-5. IEEE, (2007)Turning Off GPS Is Not Enough: Cellular Location Leaks over the Internet., , , , and . Privacy Enhancing Technologies, volume 7981 of Lecture Notes in Computer Science, page 103-122. Springer, (2013)Providing Transparent Security Services to Sensor Networks., , and . ICC, page 3431-3436. IEEE, (2007)