Author of the publication

A Measurement Study on the Topologies of BitTorrent Networks.

, , , , and . IEEE J. Sel. Areas Commun., 31 (9-Supplement): 338-347 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VDAS: Verifiable Data Aggregation Scheme for Internet of Things., , , , and . CoRR, (2018)HeapTherapy+: Efficient Handling of (Almost) All Heap Vulnerabilities Using Targeted Calling-Context Encoding., , , , , and . DSN, page 530-542. IEEE, (2019)CLPP: Context-aware location privacy protection for location-based social network., , , , and . ICC, page 1164-1169. IEEE, (2015)A novel stochastic-encryption-based P2P Digital Rights Management scheme., , , and . ICC, page 5541-5545. IEEE, (2015)Geometric Routing on Flat Names for ICN., , , , and . GLOBECOM, page 1-6. IEEE, (2015)Understanding the topologies of BitTorrent networks: A measurement view., , , , and . GLOBECOM, page 1994-1999. IEEE, (2012)Secure data access for wireless body sensor networks., , , and . WCNC, page 1-6. IEEE, (2016)MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain., , , , , and . IEEE Access, (2017)Malware on Internet of UAVs Detection Combining String Matching and Fourier Transformation., , , , , , and . IEEE Internet Things J., 8 (12): 9905-9919 (2021)Adaptive cell relay routing protocol for mobile ad hoc networks., and . IEEE Trans. Veh. Technol., 55 (1): 278-285 (2006)