Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking., , , and . ACSAC, page 42-51. IEEE Computer Society, (2000)Network processors: prospects for practical deployment Panel 2., , , , , , and . Hot Interconnects, page 4. IEEE Computer Society, (2004)Hybrid TCP-UDP transport for Web traffic., , , and . IPCCC, page 177-184. IEEE, (1999)Using the (Open) Solaris Service Management Facility as a Building Block for System Security.. ICICS, volume 5927 of Lecture Notes in Computer Science, page 325-335. Springer, (2009)Fast and Scalable Classification of Structured Data in the Network., , , and . Networking, volume 4479 of Lecture Notes in Computer Science, page 1026-1036. Springer, (2007)Transparent multi-core cryptographic support on Niagara CMT Processors., , , , , and . IWMSE@ICSE, page 81-88. IEEE Computer Society, (2009)A Reference Model for Firewall Technology., and . ACSAC, page 133-. IEEE Computer Society, (1997)Network processors: prospects for practical deployment Panel 2., , , , , , and . Hot Interconnects, page 4. IEEE Computer Society, (2004)Analysis of a Denial of Service Attack on TCP., , , , , and . S&P, page 208-223. IEEE Computer Society, (1997)Toward Systemically Secure IT Architectures., and . WETICE, page 8-18. IEEE Computer Society, (2005)