Login / Signup
Assessment and performance analysis of DQDB MAC protocols.
Maria C. Yuang
Shih T. Liang
Published in:
Telecommun. Syst. (1993)
Keyphrases
</>
security protocols
database
real time
information retrieval
learning algorithm
case study
operating system
cryptographic protocols