Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maximizing remote work in flooding-based peer-to-peer systems., , and . Comput. Networks, 50 (10): 1583-1598 (2006)The Anatomy of Clickbot.A., and . HotBots, USENIX Association, (2007)Maximizing Remote Work in Flooding-Based Peer-to-Peer Systems., , and . DISC, volume 2848 of Lecture Notes in Computer Science, page 337-351. Springer, (2003)Experimenting with Electronic Commerce on the PalmPilot., and . Financial Cryptography, volume 1648 of Lecture Notes in Computer Science, page 1-16. Springer, (1999)Triton: A Carrier-based Approach for Detecting and Mitigating Mobile Malware., , and . J. Cyber Secur. Mobil., 3 (2): 181-212 (2014)Denial-of-service (DoS) attacks and commerce infrastructure in peer-to-peer networks.. Stanford University, USA, (2005)Open Problems in Data-Sharing Peer-to-Peer Systems., , and . ICDT, volume 2572 of Lecture Notes in Computer Science, page 1-15. Springer, (2003)Pong-cache poisoning in GUESS., and . CCS, page 98-109. ACM, (2004)Peer-to-peer research at Stanford., , , , , , , , , and 2 other author(s). SIGMOD Record, 32 (3): 23-28 (2003)Authenticity and availability in PIPE networks., , , , and . Future Gener. Comput. Syst., 21 (3): 391-400 (2005)