Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Better Support of Transaction Oriented Communication in Differentiated Services Networks., , and . QofIS, volume 2156 of Lecture Notes in Computer Science, page 158-169. Springer, (2001)CPPL: Compact Privacy Policy Language., , , , and . WPES@CCS, page 99-110. ACM, (2016)Towards In-Network Security for Smart Homes., , , , and . ARES, page 18:1-18:8. ACM, (2018)A framework for remote automation, configuration, and monitoring of real-world experiments., , , , and . WiNTECH, page 9-16. ACM, (2014)Distributed Hash Tables., , and . Peer-to-Peer Systems and Applications, volume 3485 of Lecture Notes in Computer Science, Springer, (2005)SCSlib: Transparently Accessing Protected Sensor Data in the Cloud., , , and . EUSPN/ICTH, volume 37 of Procedia Computer Science, page 370-375. Elsevier, (2014)Dynamic TinyOS: Modular and Transparent Incremental Code-Updates for Sensor Networks., , , and . ICC, page 1-6. IEEE, (2010)A blueprint for switching between secure routing protocols in wireless multihop networks., , , , and . WOWMOM, page 1-6. IEEE Computer Society, (2013)A receiver-based 802.11 rate adaptation scheme with On-Demand Feedback., , , , and . PIMRC, page 399-405. IEEE, (2012)Interoperability-Guided Testing of QUIC Implementations using Symbolic Execution., , and . EPIQ@CoNEXT, page 15-21. ACM, (2018)