Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constant Time Weighted Frequency Estimation for Virtual Network Functionalities., , and . ICCCN, page 1-9. IEEE, (2017)PPiTTA - Preserving Privacy in TV Targeted Advertising., and . SECRYPT, page 327-332. SciTePress, (2012)STewARD: SDN and blockchain-based Trust evaluation for Automated Risk management on IoT Devices., , , , and . INFOCOM Workshops, page 841-846. IEEE, (2019)Constant Time Updates in Hierarchical Heavy Hitters., , , , and . SIGCOMM, page 127-140. ACM, (2017)Efficient Hashing of Sparse Virtual Disks., and . SYSTOR, page 139. ACM, (2023)Securing Log Files through Blockchain Technology., and . SYSTOR, page 131. ACM, (2018)Efficient signature scheme for network coding., and . ISIT, page 1987-1991. IEEE, (2012)Private Web Search with Malicious Adversaries., and . Privacy Enhancing Technologies, volume 6205 of Lecture Notes in Computer Science, page 220-235. Springer, (2010)Transformation of Digital Signature Schemes into Designated Confirmer Signature Schemes., and . TCC, volume 2951 of Lecture Notes in Computer Science, page 77-100. Springer, (2004)Poster Abstract: Parallel VM Placement with Provable Guarantees., , , , , and . INFOCOM Workshops, page 1298-1299. IEEE, (2020)