Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lessons for Autonomic Services from the Design of an Anonymous DoS Protection Overlay., and . Autonomic Networking, volume 4195 of Lecture Notes in Computer Science, page 86-96. Springer, (2006)Rhythms in Twitter., , , and . SocialCom/PASSAT, page 1409-1414. IEEE Computer Society, (2011)Localising Multicast Using Application Predicates., , , and . IWSOS, volume 4725 of Lecture Notes in Computer Science, page 193-207. Springer, (2007)Efficient Geocasting in Opportunistic Networks., , , and . Computer Communications, (2018)The North Laine Shopping Guide: A Case Study in Modelling Trust in Applications., , , and . IFIPTM, volume 263 of IFIP Advances in Information and Communication Technology, page 183-197. Springer, (2008)SafetyNet: A language-based approach to programmable networks., , , and . Computer Networks, 36 (1): 101-114 (2001)Can We Use Trust in Online Dating?, , , , and . JoWUA, 1 (4): 50-61 (2010)ATOM - Active Totally Ordered Multicast., and . IWAN, volume 1942 of Lecture Notes in Computer Science, page 171-179. Springer, (2000)A framework for secure device pairing by demonstration of physical proximity., , and . FIT, page 21. ACM, (2010)Managing the Policies of Non-Technical Users in a Dynamic World., , , , and . POLICY, page 251-254. IEEE Computer Society, (2005)