Author of the publication

Traffic analyser and generator Part 1: High-speed traffic capture for IEEE 802.3/Ethernet networks.

, and . Comput. Commun., 13 (7): 407-413 (1990)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Role-Based Access Control With X.509 Attribute Certificates., , and . IEEE Internet Comput., 7 (2): 62-69 (2003)Multiprocessor architectures for high-speed LAN data link layer., , and . Comput. Commun., 15 (7): 467-470 (1992)Patient Privacy in Electronic Prescription Transfer., , and . IEEE Secur. Priv., 1 (2): 77-80 (2003)Ethereum Blockchain for Securing the Internet of Things: Practical Implementation and Performance Evaluation., , , and . Cyber Security, page 1-5. IEEE, (2019)A content addressable memory for data communications., , and . Microprocess. Microsystems, 16 (2): 59-66 (1992)The Use of Blockchain to Support Distributed AI Implementation in IoT Systems., , and . IEEE Internet Things J., 9 (16): 14790-14802 (2022)Traffic analyser and generator Part 1: High-speed traffic capture for IEEE 802.3/Ethernet networks., and . Comput. Commun., 13 (7): 407-413 (1990)Traffic analyser and generator: Part 2: Traffic capture, generation, statistics and network integrity tests program in C., and . Comput. Commun., 13 (8): 469-477 (1990)Knowledge Issues Raised in Modelling Trust in a Public Key Infrastructure., , and . Expert Syst. J. Knowl. Eng., 18 (5): 233-249 (2001)Modifying LDAP to Support PKI., , and . DBSec, volume 142 of IFIP, page 205-214. Kluwer/Springer, (2003)