Up a level |
Kumar, Prem G and Venkateram, P (1997) Security management architecture for access control to network resources. In: IEE Proceedings of Computers and Digital Techniques, 144 (6). 362 -370.
Patnaik, LM and Ramakrishna, AK and Muralidharan, R (1997) Distributed Algorithms for Mobile Hosts. In: IEE Proceedings of Computers and Digital Techniques, 144 (2). pp. 49-56.
Sarkar, S and Majumdar, AK (1991) Tagged systolic arrays. In: IEE Proceedings of Computers and Digital Techniques, 138 (5). pp. 289-294.