Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Jattack: a WebRTC load testing tool., , , and . IPTComm, page 1-6. IEEE, (2016)An active network approach to virtual private networks., , , , and . ISCC, page 502-507. IEEE Computer Society, (2002)Pinball Caching: Improving Performance of a Framework for Dynamic Web-Content Adaptation and Deliver., , and . ISCC, page 768-773. IEEE Computer Society, (2006)Measuring Janus temperature in ICE-land., , , , and . IPTComm, page 1-7. IEEE, (2018)An Engineering Approach to QoS Provisioning over the Internet., , and . ECMAST, volume 1629 of Lecture Notes in Computer Science, page 229-245. Springer, (1999)Exploiting the MIL-STD-1553 avionic data bus with an active cyber device., , , and . Comput. Secur., (2021)WebAssembly and Security: a review., and . CoRR, (2024)Chirotonia: A Scalable and Secure e-Voting Framework based on Blockchains and Linkable Ring Signatures., , , and . Blockchain, page 417-424. IEEE, (2021)Sniping at web applications to discover input-handling vulnerabilities., , and . J. Comput. Virol. Hacking Tech., 20 (4): 641-667 (November 2024)Thalos: Secure File Storage in Untrusted Clouds., and . FNSS, volume 878 of Communications in Computer and Information Science, page 178-192. Springer, (2018)