Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             19 results found
no title author magazine year volume issue page(s) type
1 Access protection solution for heavy load unfairness in DQDB Kumar, Lakshmana N
1995
18 12 p. 896-910
15 p.
article
2 Asynchronous reservation protocol for variable-sized messages in a WDM-based local network Lee, Jae Hwoon
1995
18 12 p. 880-888
9 p.
article
3 Author biographies 1995
18 12 p. 997-1001
5 p.
article
4 Calendar 1995
18 12 p. 1003-1006
4 p.
article
5 Construction of checking sequences based on characterization sets Rezaki, Ali
1995
18 12 p. 911-920
10 p.
article
6 Formal description of distributed multimedia systems: an assessment of potential techniques Bowman, Howard
1995
18 12 p. 964-977
14 p.
article
7 Formal language for security services base modelling and analysis Trček, Denis
1995
18 12 p. 921-928
8 p.
article
8 ID-based non-interactive zero-knowledge proof system based on one-out-of-two non-interactive oblivious transfer Chen, Yung-Hsiang
1995
18 12 p. 993-996
4 p.
article
9 Index to volume 18 (1995) 1995
18 12 p. 1007-1012
6 p.
article
10 Modular multicast ATM switching architecture Liaw, Ji-Horng
1995
18 12 p. 929-935
7 p.
article
11 Network access protocol for hard real-time communication systems Ulusoy, Özgür
1995
18 12 p. 943-948
6 p.
article
12 ODA implementation for multimedia teleservices Baier, R
1995
18 12 p. 889-895
7 p.
article
13 On the security of Wu and Yeh's conference key distribution system Hwang, Tzonelih
1995
18 12 p. 978-981
4 p.
article
14 Performance of PRMA in a mobile radio channel Chua, KC
1995
18 12 p. 982-987
6 p.
article
15 Real-time applications in a CRMA network: a performance analysis Anastasi, G
1995
18 12 p. 871-879
9 p.
article
16 Remote login authentication scheme based on a geometric approach Wu, Tzong-Chen
1995
18 12 p. 959-963
5 p.
article
17 Remote scheme for password authentication based on theory of quadratic residues Chang, Chin-Chen
1995
18 12 p. 936-942
7 p.
article
18 Replay tolerance of authentication protocols Lam, Kwok-Yan
1995
18 12 p. 988-992
5 p.
article
19 Stability and throughput optimization of multichannel slotted non-persistent CSMA protocol Pountourakis, IE
1995
18 12 p. 949-958
10 p.
article
                             19 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands