Author of the publication

How secure is WiFi MAC layer in comparison with IPsec for classified environments?

, , , , , and . SpringSim (CNS), page 109-116. SCS/ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How secure is WiFi MAC layer in comparison with IPsec for classified environments?, , , , , and . SpringSim (CNS), page 109-116. SCS/ACM, (2011)Optimal placement of distributed interrelated data components using genetic algorithms., and . ACM Southeast Regional Conference, ACM, (1999)Optimal Placement of Distributed Iterrelated Data Components using Genetic Algorithms. Late Breaking Papers at the Genetic Programming 1998 Conference, page 52--58. University of Wisconsin, Madison, Wisconsin, USA, Stanford University Bookstore, (22-25 July 1998)Security Constraint Allocation in Distributed Object Databases.. IC-AI, page 981-984. CSREA Press, (2003)Theoretical properties of two problems of distribution of interrelated data.. ACM Southeast Regional Conference, page 395-398. ACM, (2006)Software Security: The Dangerous Afterthought., , , , , , and . ITNG, page 815-818. IEEE Computer Society, (2012)