Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anonymous addresses for efficient and resilient routing in F2F overlays., , and . INFOCOM, page 1-9. IEEE, (2016)Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions., , , and . CoRR, (2017)SoK: Off The Chain Transactions., , , , and . IACR Cryptology ePrint Archive, (2019)SWAP: Protecting pull-based P2P video streaming systems from inference attacks., , , and . WoWMoM, page 1-9. IEEE Computer Society, (2016)Enhancing compact routing in CCN with prefix embedding and topology-aware hashing., , , and . MobiArch@MobiCom, page 49-54. ACM, (2014)A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems., , and . WOWMOM, page 1-9. IEEE Computer Society, (2018)Prognosis of Breast Cancer Using Genetic Programming., and . KES (4), volume 6279 of Lecture Notes in Computer Science, page 536-545. Springer, (2010)Zeus Milker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism., , , , and . ICDCS, page 619-629. IEEE Computer Society, (2015)Diversity entails improvement: A new neighbour selection scheme for Kademlia-type systems., , and . P2P, page 1-10. IEEE, (2014)On the impossibility of efficient self-stabilization in virtual overlays with churn., and . INFOCOM, page 298-306. IEEE, (2015)