Author of the publication

Pricing for Differentiated Internet Services.

, and . IDMS, volume 1718 of Lecture Notes in Computer Science, page 365-370. Springer, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reducing the Proliferation of Passwords in Distributed Systems., and . IFIP Congress (2), volume A-13 of IFIP Transactions, page 525-531. North-Holland, (1992)Using Deducibility in Secure Network Modelling., , , , and . ESORICS, page 117-123. AFCET, (1990)Pricing for Differentiated Internet Services., and . IDMS, volume 1718 of Lecture Notes in Computer Science, page 365-370. Springer, (1999)How and why feedback composition fails secure systems., and . CSFW, page 95-101. IEEE Computer Society, (1996)Composing Security Properties.. Security Protocols Workshop, volume 1796 of Lecture Notes in Computer Science, page 6-14. Springer, (1999)A General Theory of Security Properties., and . S&P, page 94-102. IEEE Computer Society, (1997)An Architecture for a Trusted Network., , , and . ESORICS, page 105-113. AFCET, (1990)The Worst-Case Scenario for Transmission of Synchronous Traffic in an FDDI Network., and . LCN, page 192-201. IEEE Computer Society, (1999)Finding the minimum available transmission time for the timed token medium access control protocol., , , and . ECRTS, page 185-194. IEEE Computer Society, (1999)Efficient Global Allocation of Synchronous Bandwidths for Hard Real-Time Communication with the Timed Token MAC Protocol., and . RTCSA, page 120-127. IEEE Computer Society, (1999)