Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scalable String Reconciliation by Recursive Content-Dependent Shingling., and . Allerton, page 623-630. IEEE, (2019)Anonymous Collocation Discovery: Taming the Coronavirus While Preserving Privacy., , and . CoRR, (2020)Empirical Kolmogorov Complexity.. ITA, page 1-9. IEEE, (2018)Location Leakage from Network Access Patterns., , , , and . CNS, page 214-222. IEEE, (2019)Joint monitoring and routing in wireless sensor networks using robust identifying codes., , , and . BROADNETS, page 197-206. IEEE, (2007)Union Buster: A Cross-Container Covert-Channel Exploiting Union Mounting., , , and . CSCML, volume 13301 of Lecture Notes in Computer Science, page 300-317. Springer, (2022)Case Study: Disclosure of Indirect Device Fingerprinting in Privacy Policies., , , , , and . STAST, volume 11739 of Lecture Notes in Computer Science, page 175-186. Springer, (2019)Scheduling algorithms and bounds for rateless data dissemination in dense wireless networks., , , and . CISS, page 1-6. IEEE, (2012)Rateless codes for data dissemination in sensor networks., , and . SenSys, page 393-394. ACM, (2006)CDP: a coded datagram transport protocol bridging UDP and TCP., and . SYSTOR, page 11:1-11:6. ACM, (2015)