Author of the publication

IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution.

, , , , , , and . POLICY, volume 1995 of Lecture Notes in Computer Science, page 39-56. Springer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Case Study: Interactive Visualization for Internet Security., , , and . IEEE Visualization, page 505-508. (2002)Intrusion detection for link state routing protocol through integrated network management., , , and . ICCCN, page 634-639. IEEE, (1999)A property oriented fault detection approach for link state routing protocol., , and . ICCCN, page 114-119. IEEE, (2000)iBubble: Multi-Keyword Routing Protocol for Heterogeneous Wireless Sensor Networks., , , and . INFOCOM, page 968-976. IEEE, (2008)A Socially-Aware Operating System for Trustworthy Computing., , , , , and . ICSC, page 380-386. IEEE Computer Society, (2011)Leveraging Social Interactions to Suggest Friends., , , and . ICDCS Workshops, page 386-391. IEEE Computer Society, (2013)Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework., , , and . SEC, volume 193 of IFIP Conference Proceedings, page 369-384. Kluwer, (2001)Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection., , , , , , , and . Trans. Computational Science, (2009)SIN: A Platform to Make Interactions in Social Networks Accessible., , , , , and . SocialInformatics, page 205-214. IEEE Computer Society, (2012)ISCP: design and implementation of an inter-domain security management agent (SMA) coordination protocol., , , , , , and . NOMS, page 565-578. IEEE, (2000)