Author of the publication

Proposal, design and evaluation of a mechanism to limit the length of anonymous overlay network paths.

, , , , and . Computers & Security, 28 (8): 772-784 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Path Restoration Algorithm for Anonymity in P2p File Sharing Systems., , , , and . ICSOFT (PL/DPS/KE/MUSE), page 88-95. INSTICC Press, (2007)Design, Implementation and Evaluation of an Indoor Navigation System for Visually Impaired People., , , and . Sensors, 15 (12): 32168-32187 (2015)Proposal, design and evaluation of a mechanism to limit the length of anonymous overlay network paths., , , , and . Computers & Security, 28 (8): 772-784 (2009)Discrete-time control analysis of transport channel synchronization in 3G radio access networks., , , , and . Computer Communications, 32 (13-14): 1505-1514 (2009)Empirical and analytical study of a multicast synchronous transport protocol for intracampus replication services., , , and . ICC, page 1461-1466. IEEE, (2004)An experimental test-bed for the evaluation of the hidden terminal problems on the IEEE 802.15.5 standard., , , and . Kaleidoscope, page 161-168. IEEE, (2014)Tag Loss Probability Evaluation for a Continuous Flow of Tags in the EPC-Global Standard., , , and . IWRT, page 115-126. INSTICC PRESS, (2008)Background detection of primary user activity in Opportunistic Spectrum Access., , , and . ICC, page 1422-1427. IEEE, (2015)Parallel desynchronized block matching: A feasible scheduling algorithm for the input-buffered wavelength-routed switch., , and . Computer Networks, 51 (15): 4270-4283 (2007)Simulation scalability issues in wireless sensor networks., , , , and . IEEE Communications Magazine, 44 (7): 64-73 (2006)