Author of the publication

Performance of an enhanced GSM protocol supporting non-repudiation of service.

, , and . Computer Communications, 22 (7): 675-680 (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A framework for modeling applications as distributed active objects., , , , , , and . SPDP, page 68-72. IEEE Computer Society, (1996)Analysis of a Non Repudiation Authentication Protocol for Personal Communication Systems., and . ICCCN, page 289-295. IEEE Computer Society, (1998)Model for Series of Reconfigurations in Wavelength-Routed Optical Networks., , , and . ICCCN, page 437-443. IEEE, (2004)Using RTT Variability for Adaptive Cross-Layer Approach to Multimedia Delivery in Heterogeneous Networks., , , and . IEEE Trans. Multimedia, 11 (6): 1194-1203 (2009)Simulating Agent Based Processing in an ADS Using C++ SIM., , , and . ISADS, page 231-234. IEEE Computer Society, (2001)Intelligent knowledge discovery in peer-to-peer file sharing., , and . CIKM, page 308-315. ACM, (2002)Hybrid Topology for Multicast Support in Constrained WDM Networks., , and . International Teletraffic Congress, volume 4516 of Lecture Notes in Computer Science, page 236-247. Springer, (2007)Hybrid-token ring: a load sharing local area network., , and . Computer Communications, 14 (9): 525-533 (1991)An end-to-end home network security framework., , and . Computer Communications, 27 (5): 412-422 (2004)Performance of an enhanced GSM protocol supporting non-repudiation of service., , and . Computer Communications, 22 (7): 675-680 (1999)