Author of the publication

Distributed Path Restoration Algorithm for Anonymity in P2p File Sharing Systems.

, , , , and . ICSOFT (PL/DPS/KE/MUSE), page 88-95. INSTICC Press, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Malgosa-Sanahuja, Josemaria
add a person with the name Malgosa-Sanahuja, Josemaria
 

Other publications of authors with the same name

An efficient distributed discovery service for EPCglobal network in nested package scenarios., , , and . J. Netw. Comput. Appl., 34 (3): 925-937 (2011)Accurate Packet Timestamping on Linux Platforms for Precise Capacity Estimation - An Implementation of a Highly Accurate Timestamping System Embedded in the Linux Kernel and its Application to Capacity Estimation., , , , and . ICSOFT (1), page 137-142. SciTePress, (2011)A virtualized infrastructure to offer network mapping functionality in SDN networks., , , and . Int. J. Commun. Syst., (2019)The III International Conference on digital citizenship, san sebastian, Spain, showed new ideas about how to take advantage of the new technologies for entrepreneurship Global Communications Newsletter., , and . IEEE Commun. Mag., 50 (8): 1-4 (2012)Analysis and Performance Evaluation of a Multicast File Transfer Solution for Congested Asymmetric Networks., , , and . Networking, volume 3976 of Lecture Notes in Computer Science, page 703-714. Springer, (2006)Evaluation of a Server-Free VoD Application in an In-building Scenario., , , and . AP2PS, page 192-197. IEEE Computer Society, (2009)An Efficient Methodology to Limit Path Length Guaranteeing Anonymity in Overlay Networks., , , , and . SECRYPT, page 205-208. INSTICC Press, (2008)Fountain Codes for Reliable Data Transmission in Low Voltage Power-line Networks., , , , and . ICSOFT (2), page 135-140. INSTICC Press, (2009)Analysis and performance evaluation of a multicast flow control mechanism for wired-wireless networks., , , and . Communications and Computer Networks, page 68-73. IASTED/ACTA Press, (2005)An Efficient Methodology to Limit Path Length Guaranteeing Anonymity in Overlay Networks., , , , and . SECRYPT, page 205-208. INSTICC Press, (2008)