Author of the publication

Steps toward a corporate network based on packet switching and ISDN.

, , and . ICCC, page 492-496. International Council for Computer Communication / Elsevier, (1988)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Property Based Security Risk Analysis Through Weighted Simulation., , and . ISSA, ISSA, Pretoria, South Africa, (2011)No Smurfs: Revealing Fraud Chains in Mobile Money Transfers., , , , and . ARES, page 11-20. IEEE Computer Society, (2014)The SH-Verification Tool., , and . FLAIRS Conference, page 18-22. AAAI Press, (2000)Security Compliance Tracking of Processes in Networked Cooperating Systems., , and . JoWUA, 6 (2): 21-40 (2015)Verification of Cooperating Systems - An Approach Based on Formal Languages., , and . FLAIRS Conference, page 346-350. AAAI Press, (2000)Advanced Remote Firmware Upgrades Using TPM 2.0., , and . SEC, volume 471 of IFIP Advances in Information and Communication Technology, page 276-289. Springer, (2016)Abstraction and composition: a verification method for co-operating systems., , and . J. Exp. Theor. Artif. Intell., 12 (4): 447-459 (2000)Final Architecture Specification of security, privacy, and incentive mechanisms, , , , and . CoRR, (2009)Verification of S&D Solutions for Network Communications and Devices., , , , and . Security and Dependability for Ambient Intelligence, volume 45 of Advances in Information Security, Springer, (2009)Steps toward a corporate network based on packet switching and ISDN., , and . ICCC, page 492-496. International Council for Computer Communication / Elsevier, (1988)