From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Providing service assurance in mobile opportunistic networks., , , , , и . Comput. Networks, (2014)Protocol-level hidden server discovery., , , и . INFOCOM, стр. 1043-1051. IEEE, (2013)Novel and Practical SDN-based Traceback Technique for Malicious Traffic over Anonymous Networks., , , , и . INFOCOM, стр. 1180-1188. IEEE, (2019)On the (In)security of Bluetooth Low Energy One-Way Secure Connections Only Mode., , , , , и . CoRR, (2019)A Comprehensive and Long-term Evaluation of Tor V3 Onion Services., , , , и . INFOCOM, стр. 1-10. IEEE, (2023)Prison Break of Android Reflection Restriction and Defense., , , , , , и . INFOCOM, стр. 1-10. IEEE, (2021)On simulation studies of cyber attacks against LTE networks., , , , , и . ICCCN, стр. 1-8. IEEE, (2014)Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures., , , , и . Information Hiding, том 3200 из Lecture Notes in Computer Science, стр. 266-281. Springer, (2004)Towards Incentive Mechanism for Taxi Services Allocation with Privacy Guarantee., , , , и . IPCCC, стр. 1-8. IEEE, (2018)INCOR: Inter-flow Network Coding based Opportunistic Routing in wireless mesh networks., , , , и . ICC, стр. 3666-3671. IEEE, (2015)