Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical approach to the optimization of large-scale switching networks., , and . Comput. Commun., 10 (1): 30-38 (1987)Applications of keystroke analysis for improved login security and continuous user authentication., , , and . SEC, volume 54 of IFIP Conference Proceedings, page 283-294. Chapman & Hall, (1996)New technique for the representation of access network performance., , and . Comput. Commun., 19 (6-7): 564-570 (1996)Fast heuristics for practical TDM network design., , and . Comput. Commun., 20 (7): 521-527 (1997)The Quadratic Residue Cipher and Some Notes on Implementation., , and . Cryptologia, 17 (3): 264-282 (1993)Approaches to Security in Healthcare Multimedia Systems., , , , and . Communications and Multimedia Security, volume 70 of IFIP Conference Proceedings, page 25-36. Chapman & Hall, (1996)