Author of the publication

T-Chain: A General Incentive Scheme for Cooperative Computing.

, , , , , and . IEEE/ACM Trans. Netw., 25 (4): 2122-2137 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Link dimensioning and LSP optimization for MPLS networks supporting diffserv EF and BE traffic classes, and . (2003)On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques., , and . S&P, page 334-349. IEEE Computer Society, (2006)Advanced Secure DNS Name Autoconfiguration with Authentication for Enterprise IoT Network., , and . GLOBECOM, page 1-6. IEEE, (2021)Calypso: an implementation of the order graph method., and . ICASSP, page 3342-3345. IEEE Computer Society, (1996)Deriving common malware behavior through graph clustering., and . AsiaCCS, page 497-502. ACM, (2011)Constructing a Balanced, (log(N)/loglog(N))-Diameter Super-Peer Topology for Scalable P2P Systems., and . Peer-to-Peer Computing, page 210-218. IEEE Computer Society, (2004)Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays., and . CCS, page 20-29. ACM, (2003)The delay-constrained minimum spanning tree problem., , and . ISCC, page 699-703. IEEE Computer Society, (1997)Analyzing Intensive Intrusion Alerts via Correlation., , and . RAID, volume 2516 of Lecture Notes in Computer Science, page 74-94. Springer, (2002)The Segmented Bus: A Dynamically Segmentable Interprocessor Communication Network For Intelligent Mobile Robot Systems., , and . IROS, page 309-316. IEEE, (1992)