Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The KryptoKnight family of light-weight protocols for authentication and key distribution., , , , , , and . IEEE/ACM Trans. Netw., 3 (1): 31-41 (1995)New Models and Algorithms for Future Networks., , and . PODC, page 79-89. ACM, (1988)Overview of the NBBS Architecture., , , and . IBM Syst. J., 34 (4): 564-589 (1995)Systematic Design of Two-Party Authentication Protocols., , , , , , and . CRYPTO, volume 576 of Lecture Notes in Computer Science, page 44-61. Springer, (1991)Hardware Flooding (preliminary version)., , and . SIGCOMM, page 259-270. ACM, (1991)Network Transparency: The plaNET Approach., and . INFOCOM, page 590-601. IEEE Computer Society, (1992)Distributed Control for PARIS., , , , and . PODC, page 145-159. ACM, (1990)Fault Tolerant Queries in Computer Networks., , and . WDAG, volume 312 of Lecture Notes in Computer Science, page 30-40. Springer, (1987)Fault tolerant queries in computer networks., , and . IEEE Trans. Commun., 42 (1): 100-109 (1994)Real-time packet switching: a performance analysis., , , and . IEEE J. Sel. Areas Commun., 6 (9): 1576-1586 (1988)