Author of the publication

Programmable Presence Virtualization for Next-Generation Context-Based Applications.

, , , , , , , and . PerCom, page 1-10. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Programmable Presence Virtualization for Next-Generation Context-Based Applications., , , , , , , and . PerCom, page 1-10. IEEE Computer Society, (2009)The impact of TLS on SIP server performance., , , and . IPTComm, page 59-70. ACM, (2010)Real-time monitoring of SIP infrastructure using message classification., , , , and . MineNet, page 45-50. ACM, (2007)Presence virtualization middleware for next-generation converged applications., , , , , , , and . Middleware (Companion), page 124-126. ACM, (2008)A programmable message classification engine for session initiation protocol (SIP)., , and . ANCS, page 185-194. ACM, (2007)Ensuring data integrity in storage: techniques and applications., , and . StorageSS, page 26-36. ACM, (2005)The Strength of Weak Randomization: Easily Deployable, Efficiently Searchable Encryption with Minimal Leakage., , and . DSN, page 517-529. IEEE, (2019)The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption., and . ACM Conference on Computer and Communications Security, page 1341-1352. ACM, (2016)Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption., , , , , , , and . NDSS, The Internet Society, (2019)Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces., , , , and . NDSS, The Internet Society, (2007)