From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

DoS protection for UDP-based protocols., , и . ACM Conference on Computer and Communications Security, стр. 2-7. ACM, (2003)Transparent interconnection of incompatible local area networks using bridges., и . Comput. Commun. Rev., 17 (5): 381-389 (1987)Deadlock-Free Routing Based on Ordered Links., , , , , и . LCN, стр. 62-71. IEEE Computer Society, (2002)Building Certifications Paths: Forward vs. Reverse., , , , , и . NDSS, The Internet Society, (2001)Incorporation of multiaccess links into a routing protocol.. SIGCOMM, стр. 85-94. ACM, (1983)Network security - private communication in a public world., , и . Prentice Hall series in computer networking and distributed systems Prentice Hall, (1995)Byzantine robustness, hierarchy, and scalability., и . CNS, стр. 242-250. IEEE, (2013)Scalable per-flow resource management for large hierarchical networks., , и . HPSR, стр. 160-167. IEEE, (2012)Rbridges: Transparent Routing.. INFOCOM, стр. 1211-1218. IEEE, (2004)FADE: Secure Overlay Cloud Storage with File Assured Deletion., , , и . SecureComm, том 50 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 380-397. Springer, (2010)