Author of the publication

Climber: an incentive-based resilient peer-to-peer system for live streaming services.

, , and . IPTPS, page 10. USENIX, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing., , and . CCS, page 515-530. ACM, (2019)Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer., and . ICICS, volume 4307 of Lecture Notes in Computer Science, page 1-20. Springer, (2006)Rate adaptation in visual MIMO., , , , , , and . SECON, page 583-591. IEEE, (2011)Security Analysis of Secure Password Authentication for Keystroke Dynamics., and . KES (1), volume 4251 of Lecture Notes in Computer Science, page 916-923. Springer, (2006)A Guided Approach to Behavioral Authentication., , , and . ACM Conference on Computer and Communications Security, page 2237-2239. ACM, (2018)Drag-and-type: a new method for typing with virtual keyboards on small touchscreens., , and . IEEE Trans. Consumer Electron., 60 (1): 99-106 (2014)Poster: Effective Layers in Coverage Metrics for Deep Neural Networks., , , , and . ACM Conference on Computer and Communications Security, page 2681-2683. ACM, (2019)The Fuzzing Awakens: File Format-Aware Mutational Fuzzing on Smartphone Media Server Daemons., , , and . SEC, volume 502 of IFIP Advances in Information and Communication Technology, page 219-232. Springer, (2017)Draw It As Shown: Behavioral Pattern Lock for Mobile User Authentication., , , and . IEEE Access, (2019)Membership Inference Attacks With Token-Level Deduplication on Korean Language Models., , , , and . IEEE Access, (2023)