Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Networking for Sequoia 2000.. Comput. Commun. Rev., 22 (3): 41-42 (1992)Name-Based Security for Information-Centric Networking Architectures., and . Future Internet, 11 (11): 232 (2019)Analysis of the effect of InfoRanking on content pollution in peer-to-peer systems., , , , and . Secur. Commun. Networks, 7 (4): 700-713 (2014)Self-verifiable content using decentralized identifiers., , , , and . Comput. Networks, (July 2023)Caching and mobility support in a publish-subscribe internet architecture., , , , and . IEEE Communications Magazine, 50 (7): 52-58 (2012)A queueing theoretic approach to the delay analysis for a class of conflict resolution algorithms.. University of Toronto, Canada, (1989)Securing Named Data Networking routing using Decentralized Identifiers., , , , and . HPSR, page 1-6. IEEE, (2021)R?ddle: A Fully Decentralized Mobile Game for Fun and Profit., , , and . BLOCKCHAIN, volume 595 of Lecture Notes in Networks and Systems, page 100-109. Springer, (2022)Enabling self-verifiable mutable content items in IPFS using Decentralized Identifiers., , and . Networking, page 1-6. IEEE, (2021)Delay Analysis of a Window Tree Conflict Resolution Algorithm in a Local Area Network Environment., and . SIGMETRICS, page 234-244. ACM, (1987)