Author of the publication

Identifying Malicious Peers Before It's Too Late: A Decentralized Secure Peer Sampling Service.

, , and . SASO, page 237-246. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A case for hierarchical routing in low-power wireless embedded networks., and . ACM Trans. Sens. Networks, 8 (3): 25:1-25:34 (2012)Algorithmic Design of the Globe Wide-Area Location Service., , , and . Comput. J., 41 (5): 297-310 (1998)A wide-area Distribution Network for free software., , and . ACM Trans. Internet Techn., 6 (3): 259-281 (2006)Modeling and Predicting End-to-End Response Times in Multi-tier Internet Applications., , , and . ITC, volume 4516 of Lecture Notes in Computer Science, page 519-532. Springer, (2007)A Case for Dynamic Selection of Replication and Caching Strategies., , and . WCW, page 275-282. Kluwer, (2003)On the Run-Time Dynamics of a Peer-to-Peer Evolutionary Algorithm., , , and . PPSN, volume 5199 of Lecture Notes in Computer Science, page 236-245. Springer, (2008)The Measurable Environment as Nonintrusive Authentication Factor on the Example of WiFi Beacon Frames., , and . ETAA, volume 13782 of Lecture Notes in Computer Science, page 48-69. Springer, (2022)Scalable Analysis of Socially Informed Network Models: the data-aware mean-field approach, , , , and . CoRR, (September 2012)Gossiping in distributed systems, and . SIGOPS Oper. Syst. Rev., 41 (5): 2--7 (2007)Distributed systems - principles and paradigms, 2nd Edition., and . Pearson Education, (2007)