Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deployment and Experimentation of an active network at a: large scale: AMARRAGE., , , , , and . Net-Con, volume 235 of IFIP Conference Proceedings, page 141-152. Kluwer, (2002)Performance Evaluation of RMTP Using NS and RMTP Integration in Current Networks., and . INTERWORKING, volume 1938 of Lecture Notes in Computer Science, page 147-159. Springer, (2000)Security assurance of local data stored by HTML5 web application., and . IAS, page 47-52. IEEE, (2014)Towards a modular and interoperable SNMPv3., , , and . NOMS, page 391-394. IEEE, (1998)Security Verification of a Virtual Private Network over MPLS., and . Net-Con, volume 229 of IFIP, page 339-353. Springer, (2005)A Blockchain-based Lightweight Authentication Solution for IoT., , , and . CSNet, page 28-34. IEEE, (2019)Access control in probative value Cloud., , and . ICITST, page 607-611. IEEE, (2013)Survey on packet marking fields and information for IP traceback., , and . CFIP/NOTERE, page 1-8. IEEE, (2015)Creating implementations from Promela models., and . The Spin Verification System, volume 32 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, page 91-99. DIMACS/AMS, (1996)Bayesian statistical analysis for spams., and . LCN, page 989-992. IEEE Computer Society, (2010)