Author of the publication

Secure File Allocation and Caching in Large-scale Distributed Systems.

, , and . SECRYPT, page 182-191. SciTePress, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Segmented Scan and Simulation of Reconfigurable Architectures on Fixed Connection Networks., and . HiPC, volume 1970 of Lecture Notes in Computer Science, page 51-60. Springer, (2000)A Time Driven Methodology for Key Dimensioning in Multicast Communications., , and . SEC, volume 250 of IFIP Conference Proceedings, page 121-132. Kluwer, (2003)The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack, , , , and . CoRR, (2009)Routing in outer space: fair traffic load in multi-hop wireless networks., and . MobiHoc, page 23-32. ACM, (2008)Unassailable sensor networks., , and . SecureComm, page 26. ACM, (2008)A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks., , , and . MobiHoc, page 80-89. ACM, (2007)The Doge of Wall Street: Analysis and Detection of Pump and Dump Cryptocurrency Manipulations., , , and . ACM Trans. Internet Techn., 23 (1): 11:1-11:28 (2023)A Light in the Dark Web: Linking Dark Web Aliases to Real Internet Identities., , , , and . ICDCS, page 311-321. IEEE, (2020)Cross-Domain Authorship Attribution Combining Instance Based and Profile-Based Features., , , , , and . CLEF (Working Notes), volume 2380 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)Pump and Dumps in the Bitcoin Era: Real Time Detection of Cryptocurrency Market Manipulations., , , and . ICCCN, page 1-9. IEEE, (2020)