Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Peer-to-Peer Overlay Multicast for Scalable Audiovisual Services over Converging Wired and Wireless Networks., , , and . MMNS, volume 5274 of Lecture Notes in Computer Science, page 114-126. Springer, (2008)Translation of QoS Parameters into ATM Performance Parameters in B-ISDN., and . INFOCOM, page 748-755. IEEE Computer Society, (1993)Network management: interoperability and information model., and . Comput. Commun., 14 (10): 588-597 (1991)A New Key Distribution Scheme for Secure Multicast Communications., , and . ICWI, page 1119-1124. IADIS, (2003)SAKE - Secure Authenticated Key Establishment in Sensor Networks., , , and . SECRYPT, page 154-160. INSTICC Press, (2008)Network Management with X.500 distributed services., and . ULPAA, volume C-25 of IFIP Transactions, page 313-326. Elsevier, (1994)Translation of user's QoS paremeters into ATM performance requirements., and . Broadband Communications, volume C-24 of IFIP Transactions, page 51-64. Elsevier, (1994)Users' vs Provider's views of Quality of Service in B-ISDN., , and . INDC, volume C-23 of IFIP Transactions, page 231-245. North-Holland, (1994)Implementation of Access Control in an X.500 Environment., , , and . INDC, volume C-6 of IFIP Transactions, page 41-53. North-Holland, (1992)Kerberos Implementation in Manets., , , and . SECRYPT, page 161-166. INSTICC Press, (2008)