Login / Signup

Assessment and performance analysis of DQDB MAC protocols.

Maria C. YuangShih T. Liang
Published in: Telecommun. Syst. (1993)
Keyphrases
  • security protocols
  • database
  • real time
  • information retrieval
  • learning algorithm
  • case study
  • operating system
  • cryptographic protocols