Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Request aggregation, caching, and forwarding strategies for improving large climate data distribution with NDN: a case study., , and . ICN, page 54-65. ACM, (2017)Mitigating Content Poisoning With Name-Key Based Forwarding and Multipath Forwarding Based Inband Probe for Energy Management in Smart Cities., , , , and . IEEE Access, (2018)Detecting and Mitigating A Sophisticated Interest Flooding Attack in NDN from the Network-Wide View., , , , , , and . NMIC@ICDCS, page 7-12. IEEE, (2019)Quantitative Detection of Mixed Gases by Sensor Array Using C-Means Clustering and Artificial Neural Network., , , , , , , , , and . IECON, page 6748-6751. IEEE, (2019)An Identity-Based Restricted Deniable Authentication Protocol., , and . ISPA, page 474-478. IEEE Computer Society, (2009)An Analysis of Security in Social Networks., , , and . DASC, page 648-651. IEEE Computer Society, (2009)A New Algorithm for Network Diameter., , and . ICYCS, page 247-252. IEEE Computer Society, (2008)Deniable Proxy-Anonymous Signatures., , and . ICYCS, page 2131-2136. IEEE Computer Society, (2008)Facilitating ICN deployment with an extended openflow protocol., , , , , and . ICN, page 123-133. ACM, (2017)Bridging the ICN Deployment Gap with IPoC: An IP-over-ICN protocol for 5G Networks., , and . NEAT@SIGCOMM, page 1-7. ACM, (2018)