Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Framework Proposal for Sender's Authentication., , , and . Security and Management, page 675-679. CSREA Press, (2008)NomadiKey: User authentication for smart devices based on nomadic keys., , , , , , , , and . ICC, page 1-6. IEEE, (2016)How and how much traceroute confuses our understanding of network paths., , , , , and . LANMAN, page 1-7. IEEE, (2016)AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle., , , , , , , , , und 1 andere Autor(en). SenSys, Seite 1-15. ACM, (2016)Towards impactful routing research: running your own (Emulated) as on the (Real) internet., , , , , und . CoNEXT Student Workhop, Seite 31-34. ACM, (2013)Analyzing client interactivity in streaming media., , , , , , und . WWW, Seite 534-543. ACM, (2004)Measuring, Characterizing, and Avoiding Spam Traffic Costs., , , , , , , , und . IEEE Internet Comput., 20 (4): 16-24 (2016)Self-Adaptive Capacity Management for Multi-Tier Virtualized Environments., , , und . Integrated Network Management, Seite 129-138. IEEE, (2007)Joint admission control and resource allocation in virtualized servers., , , , , und . J. Parallel Distrib. Comput., 70 (4): 344-362 (2010)Construction and maintenance of P2P overlays for live streaming., , , , und . Multim. Tools Appl., 80 (13): 20255-20282 (2021)