Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TrickleDNS: Bootstrapping DNS security using social trust., , , and . COMSNETS, page 1-10. IEEE, (2012)Exploring Internet Security Perceptions and Practices in Urban Ghana., , and . SOUPS, page 129-142. USENIX Association, (2014)Routing in an Internet-Scale Network Emulator., , , , and . MASCOTS, page 275-283. IEEE Computer Society, (2004)A Novel Machine-to-Machine Traffic Multiplexing in LTE-A System Using Wireless In-Band Relaying., , , , and . MONAMI, volume 125 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 149-158. Springer, (2013)SMS-based web search for low-end mobile devices., , and . MobiCom, page 125-136. ACM, (2010)Digital Privacy Challenges with Shared Mobile Phone Use in Bangladesh., , , and . PACMHCI, 1 (CSCW): 17:1-17:20 (2017)From Alley to Landfill: Challenges of and Design Opportunities for Cleaning Dhaka's Communal Trash., , , and . ICTD, page 9. ACM, (2016)xCache: Rethinking Edge Caching for Developing Regions., , , , and . ICTD, page 5:1-5:11. ACM, (2017)The persistence of paper: a case study in microfinance from Ghana., , , and . ICTD, page 13:1-13:10. ACM, (2015)Extreme Web Caching for Faster Web Browsing., , , , and . SIGCOMM, page 111-112. ACM, (2015)