Author of the publication

CR-Chord: Improving lookup availability in the presence of malicious DHT nodes.

, , and . Comput. Networks, 55 (13): 2914-2928 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IoT and HIP's Opportunistic Mode., , and . IEEE Trans. Mob. Comput., 20 (4): 1434-1448 (2021)Towards behavioral control in multi-player network games., and . GAMENETS, page 683-690. IEEE, (2009)On calibrating enterprise switch measurements., , , and . Internet Measurement Conference, page 143-155. ACM, (2009)Modeling wireless links for transport protocols., and . Comput. Commun. Rev., 34 (2): 85-96 (2004)Survey on Congestion Control Mechanisms for Wireless Sensor Networks., and . NEW2AN, volume 7469 of Lecture Notes in Computer Science, page 75-85. Springer, (2012)Computing the Retransmission Timeout in CoAP., , and . NEW2AN, volume 8121 of Lecture Notes in Computer Science, page 352-362. Springer, (2013)Transparent CoAP Services to IoT Endpoints through ICN Operator Networks., , , , and . Sensors, 19 (6): 1339 (2019)06441 Abstracts Collection -- Naming and Addressing for Next Generation Internetworks., , , , and . Naming and Addressing for Next-Generation Internetworks, volume 06441 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2006)Detection of evil flies: securing air-ground aviation communication., , , and . MobiCom, page 852-854. ACM, (2021)Optimization of relay placement for scalable virtual private LAN services., , and . FIRA@SIGCOMM, page 43-49. ACM, (2022)