Author of the publication

Securing Layer 2 in Local Area Networks.

, , , , , and . ICN (2), volume 3421 of Lecture Notes in Computer Science, page 699-706. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Traffic engineering based on local states in Internet protocol-based radio access networks., , , , , , and . J. Commun. Networks, 7 (3): 377-384 (2005)Distributed bandwidth reservation by probing for available bandwidth., , , , and . ICON, page 443-448. IEEE, (2003)Probing available bandwidth in radio access networks., , , , and . GLOBECOM, page 3437-3441. IEEE, (2003)Simulating Router-based Traffic-engineering in Radio Access Networks using NS-2., , , , , and . Communications, Internet, and Information Technology, page 136-141. IASTED/ACTA Press, (2002)Securing Layer 2 in Local Area Networks., , , , , and . ICN (2), volume 3421 of Lecture Notes in Computer Science, page 699-706. Springer, (2005)Communication Networks Adaptive measurement-based traffic engineering in small differentiated services domains., , , , and . Eur. Trans. Telecommun., 18 (1): 35-47 (2007)Adaptive Per-Flow Traffic Engineering Based on Probe Packet Measurements., , , , and . CNSR, page 131-136. IEEE Computer Society, (2005)M-MPLS: Micromobility-enabled multiprotocol label switching., , , , , and . ICC, page 250-255. IEEE, (2003)Addressing the Weak Link Between Layer 2 and Layer 3 in the Internet Architecture., , , , , and . LCN, page 417-418. IEEE Computer Society, (2004)