Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Informing Protocol Design Through Crowdsourcing: the Case of Pervasive Encryption., , and . C2B(I)D@SIGCOMM, page 3-8. ACM, (2015)Traffic Engineering in Multihomed Sites., , , , and . ISCC, page 495-500. IEEE Computer Society, (2005)A QoS-Driven ISP Selection Mechanism for IPv6 Multi-homed Sites., , , and . PROMS, volume 2213 of Lecture Notes in Computer Science, page 23-34. Springer, (2001)A first look at the IP eXchange ecosystem., , , , , and . Comput. Commun. Rev., 50 (4): 25-34 (2020)Security for multipath TCP: a constructive approach., , , and . Int. J. Internet Protoc. Technol., 6 (3): 146-155 (2011)SAVI: The IETF standard in address validation., and . IEEE Commun. Mag., 51 (4): 66-73 (2013)Global mobile network aggregators: taxonomy, roaming performance and optimization., , , , , , and . MobiSys, page 183-195. ACM, (2022)Scalable Support for Globally Moving Networks., , , and . ISWCS, page 108-112. IEEE, (2006)A framework for large-scale measurements., , , , and . Future Network & Mobile Summit, page 1-10. IEEE, (2013)NAT Revelio: Detecting NAT444 in the ISP., , , and . PAM, volume 9631 of Lecture Notes in Computer Science, page 149-161. Springer, (2016)