Author of the publication

Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme.

, , , and . Computer Networks, 46 (2): 253-272 (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Packet Audio Playout Delay Adjustment: Performance Bounds and Algorithms., , and . Multimedia Syst., 6 (1): 17-28 (1998)Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme., , , and . Computer Networks, 46 (2): 253-272 (2004)Analysis of point-to-point packet delay in an operational network., , , , and . Computer Networks, 51 (13): 3812-3827 (2007)Quantile sampling for practical delay monitoring in Internet backbone networks., , , , and . Computer Networks, 51 (10): 2701-2716 (2007)Modeling and predicting the popularity of online contents with Cox proportional hazard regression model., , and . Neurocomputing, 76 (1): 134-145 (2012)Path Protection Routing with SRLG Constraints to Support IPTV in WDM Mesh Networks., , , , and . INFOCOM, IEEE, (2006)Accelerating SSL with GPUs., , , , and . Computer Communication Review, 41 (1): 135-139 (2011)Design and Deployment of a Passive Monitoring Infrastructure., , , , , , and . IWDC, volume 2170 of Lecture Notes in Computer Science, page 556-575. Springer, (2001)An Educational Networking Framework for Full Layer Implementation and Testing., , and . SIGCSE, page 663-668. ACM, (2015)Synchronized Two-Way Voice Simulation Tool for Internet Phone Performance Analysis and Evaluation., , and . Computer Performance Evaluation, volume 1245 of Lecture Notes in Computer Science, page 108-122. Springer, (1997)