Author of the publication

An Accurate System-Wide Anonymity Metric for Probabilistic Attacks.

, , , and . PETS, volume 6794 of Lecture Notes in Computer Science, page 117-133. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Achieving data K-Availability in intermittently connected sensor networks., , and . ICCCN, page 1-8. IEEE, (2014)LB-MAP: Load-Balanced Middlebox Assignment in Policy-Driven Data Centers., , and . ICCCN, page 1-9. IEEE, (2017)A Cloud Based Three Layer Key Management Scheme for VANET., and . GSKI (2), volume 849 of Communications in Computer and Information Science, page 574-587. Springer, (2017)Study of SOA Component Dynamic Scheduling Based on Mobile Agent Coalitio., , and . ICEB, page 1193-1196. Academic Publishers/World Publishing Corporation, (2004)Crossover Ring Oscillator PUF., , , , , and . ISQED, page 237-243. IEEE, (2017)The Study of Address Tree Coding Based on the Maximum Matching Algorithm in Courier Business., , and . CETS, volume 113 of Communications in Computer and Information Science, page 38-45. Springer, (2010)Profit-based file replication in data intensive cloud data centers., , and . ICC, page 1-7. IEEE, (2017)DAO2: Overcoming Overall Storage Overflow in Intermittently Connected Sensor Networks.. INFOCOM, page 135-143. IEEE, (2018)Opportunistic Bandwidth Sharing for Virtual Network Mapping., , , , and . GLOBECOM, page 1-5. IEEE, (2011)DAO-R: Integrating Data Aggregation and Offloading in Sensor Networks via Data Replication., , , and . GLOBECOM, page 1-7. IEEE, (2015)