From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The ephemerizer: making data disappear. Sun Microsystems, Inc., (2005)Interconnections: Bridges and Routers. Addison Wesley, Reading, Massachusetts, (1992)Key Exchange in IPSec: Analysis of IKE, и . IEEE Internet Computing, 4 (6): 50--56 (November 2000)DoS protection for UDP-based protocols., , и . ACM Conference on Computer and Communications Security, стр. 2-7. ACM, (2003)Transparent interconnection of incompatible local area networks using bridges., и . Comput. Commun. Rev., 17 (5): 381-389 (1987)Deadlock-Free Routing Based on Ordered Links., , , , , и . LCN, стр. 62-71. IEEE Computer Society, (2002)Building Certifications Paths: Forward vs. Reverse., , , , , и . NDSS, The Internet Society, (2001)Incorporation of multiaccess links into a routing protocol.. SIGCOMM, стр. 85-94. ACM, (1983)Network security - private communication in a public world., , и . Prentice Hall series in computer networking and distributed systems Prentice Hall, (1995)Byzantine robustness, hierarchy, and scalability., и . CNS, стр. 242-250. IEEE, (2013)