Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cognitive Adaptation for Teams in ADROIT., , , , , , , , and . GLOBECOM, page 4868-4872. IEEE, (2007)A 50-Gb/s IP router., , , , , , , , , and 13 other author(s). IEEE/ACM Trans. Netw., 6 (3): 237-248 (1998)A Public-Key Based Secure Mobile IP., , , , , , , and . MobiCom, page 173-184. ACM, (1997)Quantum cryptography in practice., , and . SIGCOMM, page 227-238. ACM, (2003)Smart Office Spaces., , , , , , and . USENIX Workshop on Embedded Systems, USENIX Association, (1999)A public-key based secure Mobile IP., , , , , , , and . Wireless Networks, 5 (5): 373-390 (1999)Secure Network Attribution and Prioritization: A Coordinated Architecture for Critical Infrastructure., and . MILCOM, page 226-230. IEEE, (2013)Time surveying: clock synchronization over packet networks.. Massachusetts Institute of Technology, Cambridge, MA, USA, (1994)ndltd.org (oai:dspace.mit.edu:1721.1/34060).