Author of the publication

Authentication in stealth distributed hash tables.

, , , , and . Journal of Systems Architecture - Embedded Systems Design, 54 (6): 607-618 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authentication in stealth distributed hash tables., , , , and . Journal of Systems Architecture - Embedded Systems Design, 54 (6): 607-618 (2008)At Home with Users: A Comparative View of Living Labs., , , , , , , and . Interacting with Computers, 27 (1): 21-35 (2015)uLearn: Facilitating Ubiquitous Learning through Camera Equipped Mobile Phones., and . WMTE, page 274-281. IEEE Computer Society, (2005)Closing the Gap: Human Factors in Cross-Device Media Synchronization., , , , , , and . J. Sel. Topics Signal Processing, 11 (1): 180-195 (2017)A privacy preserving approach to energy theft detection in smart grids., , and . ISC2, page 1-4. IEEE, (2016)Digital Authoring of Interactive Public Display Applications., , and . TVX, page 127-136. ACM, (2018)Multimodal QoE evaluation in P2P-based IPTV systems., , , , and . ACM Multimedia, page 1321-1324. ACM, (2011)Evaluating the Real-World Performance of 5G Fixed Wireless Broadband in Rural Areas., , , and . 5G World Forum, page 465-470. IEEE, (2019)Evaluation of the socio-economic implications of contractual mobility in roaming architectures., , and . GLOBECOM, page 2840-2845. IEEE, (2012)OpenCache: A software-defined content caching platform., , , , and . NetSoft, page 1-5. IEEE, (2015)