Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spatially Limited Contention for Multi-Hop Wireless Networks., , and . GLOBECOM, page 228-233. IEEE, (2008)A Combinatorial Approach to Measuring Anonymity., , and . ISI, page 356-363. IEEE, (2007)Combinatorial design of congestion-free networks., , and . IEEE/ACM Trans. Netw., 5 (6): 989-1000 (1997)AVLeak: Fingerprinting Antivirus Emulators through Black-Box Testing., , , , and . WOOT, USENIX Association, (2016)Analysis of Load-Balanced Switch with Finite Buffers., , , and . GLOBECOM, page 1524-1529. IEEE, (2008)On anonymity in an electronic society: A survey of anonymous communication systems., and . ACM Comput. Surv., 42 (1): 5:1-5:35 (2009)Prediction of Growth Factor-Dependent Cleft Formation During Branching Morphogenesis Using A Dynamic Graph-Based Growth Model., , , , , , and . IEEE ACM Trans. Comput. Biol. Bioinform., 13 (2): 350-364 (2016)Antikernel: A Decentralized Secure Hardware-Software Operating System Architecture., and . CHES, volume 9813 of Lecture Notes in Computer Science, page 237-256. Springer, (2016)Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks., , and . ICC, page 2262-2267. IEEE, (2006)Topological Design of Loss-Free Switch-Based LANs., , and . INFOCOM, page 88-96. IEEE Computer Society, (1995)