Author of the publication

A Design Study of a Hierarchically Connected Packet-Switching Network Using Simulation Techniques.

, , , , and . Comput. Networks, (1979)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Standards for data security - the state of the art.. Comput. Commun., 8 (5): 231-234 (1985)Simulation Studies of an Isarithmically Controlled Store and Forward Data Communication Network.. IFIP Congress, page 151-154. (1974)Some Comments on Simulated Datagram Store-and-Forward Networks., and . Comput. Networks, (1978)Security for computer networks - an introduction to data security in teleprocessing and electronic funds transfer (2. ed.)., and . Wiley series in communication and distributed systems Wiley, (1989)Security for computer networks: and introduction to data security in teleprocessing and electronic funds transfer (2nd ed.), and . John Wiley & Sons, Inc., New York, NY, USA, (1989)A Simulation Study of Routing and Flow Control Problems in a Hierarchically Connected Packet Switching Network., , , and . ICCC, page 495-501. International Council for Computer Communication, (1976)The NPL Intelligent Token and its Application.. EUROCRYPT, page 10-13. (1986)Standards for Data Security - A Change of Direction.. CRYPTO, volume 293 of Lecture Notes in Computer Science, page 3-8. Springer, (1987)A Design Study of a Hierarchically Connected Packet-Switching Network Using Simulation Techniques., , , , and . Comput. Networks, (1979)Progress in Data Security Standardization.. CRYPTO, volume 435 of Lecture Notes in Computer Science, page 620-623. Springer, (1989)