A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients | 7 | 0.60 | 2015 |
Mobile offloading in the wild: Findings and lessons learned through a real-life experiment with a new cloud-aware system | 19 | 0.97 | 2014 |
A Needle in the Haystack - Delay Based User Identification in Cellular Networks | 0 | 0.34 | 2014 |
Data offloading in social mobile networks through VIP delegation. | 19 | 0.72 | 2014 |
On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records | 10 | 0.58 | 2014 |
To Offload Or Not To Offload? The Bandwidth And Energy Costs Of Mobile Cloud Computing | 107 | 3.81 | 2013 |
CellFlood: Attacking Tor Onion Routers on the Cheap. | 8 | 0.48 | 2013 |
CloudShield: Efficient anti-malware smartphone patching with a P2P network on the cloud | 3 | 0.45 | 2012 |
Personal Marks and Community Certificates: Detecting Clones in Mobile Wireless Networks of Smart-Phones | 0 | 0.34 | 2011 |
VIP delegation: Enabling VIPs to offload data in wireless social mobile networks | 5 | 0.48 | 2011 |