Author of the publication

Role-based policy distribution techniques in policy-based networks.

, , , and . Communications, Internet, and Information Technology, page 103-107. IASTED/ACTA Press, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hash Function with Variable Output Length., and . NCM, page 600-605. IEEE Computer Society, (2009)Role-based policy distribution techniques in policy-based networks., , , and . Communications, Internet, and Information Technology, page 103-107. IASTED/ACTA Press, (2004)An Efficient Algorithm for Intrusion Source Identification., and . NCM (2), page 188-190. IEEE Computer Society, (2008)978-0-7695-3322-3.Development of Unidirectional Security Gateway Satisfying Security Functional Requirements., , and . MUE/FutureTech, volume 448 of Lecture Notes in Electrical Engineering, page 709-714. (2017)Security Requirement for Cyber Attack Traceback., and . NCM (2), page 653-658. IEEE Computer Society, (2008)978-0-7695-3322-3.Secure firmware architecture using virtual hard disks., and . IAS, page 66-70. IEEE, (2014)Development of unidirectional security gateway appliance using intel 82580EB NIC interface., and . ICTC, page 1194-1196. IEEE, (2016)Design and Implementation of Policy Decision Point in Policy-Based Network., , and . ACIS-ICIS, page 534-538. IEEE Computer Society, (2005)Information-Revealing with Distributed Escrow Authorities., and . NCM, page 1141-1146. IEEE Computer Society, (2009)