Author of the publication

The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities.

, , , , and . IEEE Trans. Mob. Comput., 14 (11): 2376-2391 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Mao, Zhuoqing Morley
add a person with the name Mao, Zhuoqing Morley
 

Other publications of authors with the same name

Differentiated BGP Update Processing for Improved Routing Convergence., , and . ICNP, page 280-289. IEEE Computer Society, (2006)TOP: Tail Optimization Protocol For Cellular Radio Resource Allocation., , , , , and . ICNP, page 285-294. IEEE Computer Society, (2010)WACCO and LOKO: Strong Consistency at Global Scale., , , , and . CIC, page 130-141. IEEE, (2015)A measurement study of Internet bottlenecks., , , , and . INFOCOM, page 1689-1700. IEEE, (2005)Peeking into Spammer Behavior from a Unique Vantage Point., , and . LEET, USENIX Association, (2008)Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions., , , and . OSDI, page 117-130. USENIX Association, (2008)ShadowNet: A Platform for Rapid and Safe Network Evolution., , and . USENIX Annual Technical Conference, USENIX Association, (2009)You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks., , , , , and . NDSS, The Internet Society, (2012)On Network-level Clusters for Spam Detection., , , and . NDSS, The Internet Society, (2010)Performance and Energy Consumption Analysis of a Delay-Tolerant Network for Censorship-Resistant Communication., , , , , , and . MobiHoc, page 257-266. ACM, (2015)