Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS., , , , , , , , and . SIGCOMM, page 199-212. ACM, (2015)If you are not paying for it, you are the product: how much do advertisers pay to reach you?, , , and . Internet Measurement Conference, page 142-156. ACM, (2017)Anatomy of a P2P Content Distribution system with Network Coding., , and . IPTPS, (2006)Network coding for large scale content distribution., and . INFOCOM, page 2235-2245. IEEE, (2005)Cooperative Security for Network Coding File Distribution., and . INFOCOM, IEEE, (2006)Fuzzy expert system for the detection of episodes of poor water quality through continuous measurement., , , , , and . Expert Syst. Appl., 39 (1): 1011-1020 (2012)Analysis of web caching architectures: hierarchical and distributed caching., , and . IEEE/ACM Trans. Netw., 9 (4): 404-418 (2001)Delay-Tolerant Bulk Internet Transfers., and . ERCIM News, (2009)On the feasibility of commercial, legal P2P content distribution., , and . Comput. Commun. Rev., 36 (1): 75-78 (2006)Privacy risks in named data networking: what is the cost of performance?, , , , , and . Comput. Commun. Rev., 42 (5): 54-57 (2012)