Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Atomix: A Framework for Deploying Signal Processing Applications on Wireless Infrastructure., , and . NSDI, page 173-188. USENIX Association, (2015)PowerSpy: Location Tracking using Mobile Device Power Analysis., , , and . CoRR, (2015)Visualizing Real-Time Network Resource Usage., , , , and . VizSEC, volume 5210 of Lecture Notes in Computer Science, page 119-135. Springer, (2008)Maranello: Practical Partial Packet Recovery for 802.11., , , , , , , , and . NSDI, page 205-218. USENIX Association, (2010)PowerSpy: Location Tracking Using Mobile Device Power Analysis., , , , and . USENIX Security Symposium, page 785-800. USENIX Association, (2015)How to Find Correlated Internet Failures., , , , and . PAM, volume 11419 of Lecture Notes in Computer Science, page 210-227. Springer, (2019)On the Fidelity of 802.11 Packet Traces., , and . PAM, volume 4979 of Lecture Notes in Computer Science, page 132-141. Springer, (2008)Analysis of SSL certificate reissues and revocations in the wake of heartbleed., , , , , , and . Internet Measurement Conference, page 489-502. ACM, (2014)Shire: Making FPGA-accelerated Middlebox Development More Pleasant., , , , and . CoRR, (2022)Analysis of SSL certificate reissues and revocations in the wake of heartbleed., , , , , , and . Commun. ACM, 61 (3): 109-116 (2018)