Author of the publication

Using recurring costs for reputation management in peer-to-peer streaming systems.

, , and . SecureComm, page 283-292. IEEE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing and improving the resistance of overlays against bandwidth exhaustion attacks., , and . ICUMT, page 779-785. IEEE, (2012)On distributed geolocation by employing spring-mass systems., , , and . GIIS, page 1-7. IEEE, (2013)Resilient and underlay-aware P2P live-streaming., , , and . Computer Networks, (2014)A Comprehensive Framework to Evaluate Wireless Networks in Simulation and Real Systems., , , , and . DS-RT, page 29-36. IEEE Computer Society, (2018)Sensor Network Security.. Embedded Systems Handbook, CRC Press, (2005)Geocast into the past: Towards a privacy-preserving spatiotemporal multicast for cellular networks., , , and . ICC, page 2016-2021. IEEE, (2013)Capabilities and objectives of distributed image processing on smart camera systems., , and . ISCC, page 940-945. IEEE Computer Society, (2013)Geocast into the Past: Towards a Privacy-Preserving Spatiotemporal Multicast for Cellular Networks, , , and . CoRR, (2012)Towards Trustworthy Mobile Social Networking Services for Disaster Response, , and . CoRR, (2012)Towards Voronoi-Based Backup Routing for Large-Scale Distributed Applications., , , and . GIIS, page 1-5. IEEE, (2018)