A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Design of a key agile cryptographic system for OC-12c rate ATM
SNDSS '95 Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95)
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Security issues in ATM networks
ACM SIGOPS Operating Systems Review
A circular skip-cluster scheme to support video-on-demand services
Multimedia Systems
Security issues for wireless ATM networks
ACM SIGOPS Operating Systems Review
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
Tutorial: ATM - protocols and architecture
Computer Communications
Hi-index | 48.22 |
High-speed networking technology and standards have progressed dramatically in the past few years and much attention is now focused on deployment efforts, such as the North Carolina Information Highway (NCIH) [7], and applications. With this shift in emphasis, concerns have been raised about information security. Examples of abuse of the Internet abound and unfortunately ATM networks are subject to many of these same abuses. This is of subtanstial concern when thinking about extending the reach of public data networking to broad segments of society.