Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance of an enhanced GSM protocol supporting non-repudiation of service., , and . Computer Communications, 22 (7): 675-680 (1999)Design and evaluation of adaptive secure protocol for E-commerce., , , and . ICCCN, page 32-39. IEEE, (2001)High performance communication software for standalone embedded systems based on flat memory model., , and . ICCCN, page 238-245. IEEE, (2000)Model for Series of Reconfigurations in Wavelength-Routed Optical Networks., , , and . ICCCN, page 437-443. IEEE, (2004)Simulating Agent Based Processing in an ADS Using C++ SIM., , , and . ISADS, page 231-234. IEEE Computer Society, (2001)Analysis of a Non Repudiation Authentication Protocol for Personal Communication Systems., and . ICCCN, page 289-295. IEEE Computer Society, (1998)Topological and Architectural Designs for Pre-ISDN Integration of Fiber Optic Voice and Data Networks., , and . IEEE Journal on Selected Areas in Communications, 4 (9): 1414-1423 (1986)Collaborative and Secure Resource Management with Distributed Agents., , , and . ICPADS, page 689-697. IEEE Computer Society, (2001)An Algorithm for Traffic Grooming in WDM Optical Mesh Networks with Multiple Objectives., , and . Telecommunication Systems, 28 (3-4): 369-386 (2005)MMFS-based ATM integrated service switching (AISS) system., , , , and . ICCCN, page 602-607. IEEE, (2001)