Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient and Resilient Backbones for Multihop Wireless Networks., , , and . IEEE Trans. Mob. Comput., 7 (11): 1349-1362 (2008)SeCloak: ARM Trustzone-based Mobile Peripheral Control., , , and . CoRR, (2020)Privacy-preserving microbiome analysis using secure computation., , , , and . Bioinform., 32 (12): 1873-1879 (2016)What a mesh: understanding the design tradeoffs for streaming multicast., , and . SIGMETRICS Perform. Evaluation Rev., 37 (2): 85-86 (2009)Scalable secure group communication over IP multicast., and . IEEE J. Sel. Areas Commun., 20 (8): 1511-1527 (2002)Persona: an online social network with user-defined privacy., , , , and . SIGCOMM, page 135-146. ACM, (2009)Channel Access Throttling for Overlapping BSS Management., , , , and . ICC, page 1-6. IEEE, (2009)Systems-compatible incentives., , and . GAMENETS, page 100-106. IEEE, (2009)Privacy Capsules: Preventing Information Leaks by Mobile Apps., , , and . MobiSys, page 399-411. ACM, (2016)Are Virtualized Overlay Networks Too Much of a Good Thing?, , and . IPTPS, volume 2429 of Lecture Notes in Computer Science, page 225-231. Springer, (2002)