| 943 | -- | 953 | Marco Ajmone Marsan, Giorgio Taricco, G. Roncarolo, G. Tagliente. Simulation of three MAC protocols for intelligent highway packet radio networks |
| 954 | -- | 961 | Dimitris Gritzalis, Sokratis K. Katsikas. Towards a formal system-to-system authentication protocol |
| 962 | -- | 971 | Gerd Keiser, Carrie Carter, David Freeman. Test traffic generation equipment and algorithms for evaluating ATM networks |
| 972 | -- | 981 | Young Sik Youn, Chong Kwan Un. Performance of dilated banyan network with back-pressure mechanism |
| 982 | -- | 989 | Nils Harald Berge, Jon Ølnes. Firewalls in an OSI-environment |
| 990 | -- | 1000 | Richard Lai, M. C. Wong. The ISO virtual terminal protocol: a semi-automatic implementation |
| 1001 | -- | 1013 | Sethuraman Panchanathan, N. Gamaz, A. Jain. JPEG based scalable image compression |
| 1014 | -- | 1019 | Kwok-Yan Lam, Lucas Chi Kwong Hui. Efficient nearer-ancestor algorithm for network routing |