Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal epidemic dissemination., , and . CoRR, (2017)Worst-case, information and all-blocks locality in distributed storage systems: an explicit comparison., , , and . CWIT, page 1-5. IEEE, (2017)Convolutional LPDC codes for Distributed Storage Systems., , , and . ISIT, page 1572-1576. IEEE, (2019)Trust and Privacy in Development of Publish/Subscribe Systems., , and . ISD, ISEN Yncréa Méditerranée / Association for Information Systems, (2019)Fair and Efficient Gossip in Hyperledger Fabric., , , and . ICDCS, page 190-200. IEEE, (2020)Mind the Gap: Autonomous Detection of Partitioned MANET Systems using Opportunistic Aggregation., , , , and . SRDS, page 143-152. IEEE Computer Society, (2018)SGX-FS: Hardening a File System in User-Space with Intel SGX., , , and . CloudCom, page 67-72. IEEE Computer Society, (2018)Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure., , and . GLOBECOM, IEEE, (2006)On the Number of Subsequences When Deleting Symbols From a String., , and . IEEE Trans. Inf. Theory, 54 (7): 3279-3285 (2008)Efficient Key Updates through Subscription Re-encryption for Privacy-Preserving Publish/Subscribe., , , and . Middleware, page 25-36. ACM, (2015)