Author of the publication

Implementation of Access Control in an X.500 Environment.

, , , and . INDC, volume C-6 of IFIP Transactions, page 41-53. North-Holland, (1992)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Peer-to-Peer Overlay Multicast for Scalable Audiovisual Services over Converging Wired and Wireless Networks., , , and . MMNS, volume 5274 of Lecture Notes in Computer Science, page 114-126. Springer, (2008)Translation of QoS Parameters into ATM Performance Parameters in B-ISDN., and . INFOCOM, page 748-755. IEEE Computer Society, (1993)A New Key Distribution Scheme for Secure Multicast Communications., , and . ICWI, page 1119-1124. IADIS, (2003)Network management: interoperability and information model., and . Comput. Commun., 14 (10): 588-597 (1991)SAKE - Secure Authenticated Key Establishment in Sensor Networks., , , and . SECRYPT, page 154-160. INSTICC Press, (2008)Network Management with X.500 distributed services., and . ULPAA, volume C-25 of IFIP Transactions, page 313-326. Elsevier, (1994)Users' vs Provider's views of Quality of Service in B-ISDN., , and . INDC, volume C-23 of IFIP Transactions, page 231-245. North-Holland, (1994)Translation of user's QoS paremeters into ATM performance requirements., and . Broadband Communications, volume C-24 of IFIP Transactions, page 51-64. Elsevier, (1994)Implementation of Access Control in an X.500 Environment., , , and . INDC, volume C-6 of IFIP Transactions, page 41-53. North-Holland, (1992)Mechanism for multi-domain marking in DiffServ architecture., , and . ISCC, page 15-20. IEEE Computer Society, (2002)