Author of the publication

Applying Kerberos to the Communication Environment for Information Appliances.

, , , and . SAINT Workshops, page 214-217. IEEE Computer Society, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On seamless connectivity over multi-radio and multi-channel wireless mesh networks., , and . CoNEXT, page 58. ACM, (2008)Protocol-Independent FIB Architecture for Network Overlays., , , and . APSys, page 8:1-8:7. ACM, (2016)IoT WebSocket Connection Management Algorithm for Early Warning Earthquake Alert Applications., , and . UCC (Companion"), page 189-194. ACM, (2017)Finding Anomalies in Network System Logs with Latent Variables., , , and . Big-DAMA@SIGCOMM, page 8-14. ACM, (2018)IR-XY-PV: Infrared Multihop Communication for XY-Coordinated PV Modules., , , and . AINTEC, page 1-7. ACM, (2017)A Rule-Based Algorithm of Finding Valid Hosts for IoT Device Using Its Network Traffic., , and . IMCOM, volume 935 of Advances in Intelligent Systems and Computing, page 279-287. Springer, (2019)Protocol design for quantum repeater networks., , and . AINTEC, page 73-80. ACM, (2011)Implementation of IPv6 services over a GMPLS-based IP/optical network., , , and . IEEE Communications Magazine, 43 (5): 114-122 (2005)IPv6 integration and coexistence strategies for next-generation networks., , and . IEEE Communications Magazine, 42 (1): 88-96 (2004)Strip, bind, and search: a method for identifying abnormal energy consumption in buildings., , , , , , , and . IPSN, page 129-140. ACM, (2013)