Author of the publication

Topology Inference of Networks utilizing Rooted Spanning Tree Embeddings.

, , and . ICDCN, page 107-116. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anonymous addresses for efficient and resilient routing in F2F overlays., , and . INFOCOM, page 1-9. IEEE, (2016)SoK: Off The Chain Transactions., , , , and . IACR Cryptology ePrint Archive, (2019)Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions., , , and . CoRR, (2017)A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems., , and . WOWMOM, page 1-9. IEEE Computer Society, (2018)Prognosis of Breast Cancer Using Genetic Programming., and . KES (4), volume 6279 of Lecture Notes in Computer Science, page 536-545. Springer, (2010)Zeus Milker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism., , , , and . ICDCS, page 619-629. IEEE Computer Society, (2015)SWAP: Protecting pull-based P2P video streaming systems from inference attacks., , , and . WoWMoM, page 1-9. IEEE Computer Society, (2016)Enhancing compact routing in CCN with prefix embedding and topology-aware hashing., , , and . MobiArch@MobiCom, page 49-54. ACM, (2014)On the impossibility of efficient self-stabilization in virtual overlays with churn., and . INFOCOM, page 298-306. IEEE, (2015)Diversity entails improvement: A new neighbour selection scheme for Kademlia-type systems., , and . P2P, page 1-10. IEEE, (2014)