Author of the publication

Who are you talking to? Breaching privacy in encrypted IM networks.

, , , and . ICNP, page 1-10. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The influence mobility model: a novel hierarchical mobility modeling framework., and . WCNC, page 1638-1643. IEEE, (2005)Using Deep Autoencoders for Facial Expression Recognition., , and . CoRR, (2018)A stochastic model for transit latency in OpenFlow SDNs., , , , and . Computer Networks, (2017)Header Detection to Improve Multimedia Quality Over Wireless Networks., , , and . IEEE Trans. Multimedia, 9 (2): 377-385 (2007)Live fingerprint detection using magnitude of perceived spatial stimuli and local phase information., , , , , and . J. Electronic Imaging, 27 (05): 053038 (2018)On measuring memory length of the error rate process in wireless channels., and . CISS, page 1262-1267. IEEE, (2008)A distributed and privacy preserving algorithm for identifying information hubs in social networks., , , and . INFOCOM, page 561-565. IEEE, (2011)Increasing Network Lifetime Of An IEEE 802.15.4 Wireless Sensor Network By Energy Efficient Routing., and . ICC, page 3978-3983. IEEE, (2006)An Energy Efficient Link Layer Protocol for Power-Constrained Wireless Networks., , and . ICCCN, page 1-6. IEEE, (2011)Who are you talking to? Breaching privacy in encrypted IM networks., , , and . ICNP, page 1-10. IEEE Computer Society, (2013)