871 | -- | 879 | Giuseppe Anastasi, Marco Conti, Enrico Gregori, Luciano Lenzini. Real-time applications in a CRMA network: a performance analysis |
880 | -- | 888 | Jae-Hwoon Lee, Chong Kwan Un. Asynchronous reservation protocol for variable-sized messages in a WDM-based local network |
889 | -- | 895 | Reinhard Baier, Eckhard Moeller, Angela Scheller. ODA implementation for multimedia teleservices |
896 | -- | 910 | Lakshmana N. Kumar, Andreas D. Bovopoulos. Access protection solution for heavy load unfairness in DQDB |
911 | -- | 920 | Ali Rezaki, Hasan Ural. Construction of checking sequences based on characterization sets |
921 | -- | 928 | Denis Trcek, Borka Jerman-Blazic. Formal language for security services base modelling and analysis |
929 | -- | 935 | Ji-Horng Liaw, Cheng-Ming Weng. Modular multicast ATM switching architecture |
936 | -- | 942 | Chin-Chen Chang, Sun-Min Tsu, Chien-Yuan Chen. Remote scheme for password authentication based on theory of quadratic residues |
943 | -- | 948 | Özgür Ulusoy. Network access protocol for hard real-time communication systems |
949 | -- | 958 | Ioannis E. Pountourakis, Efstathios D. Sykas, Emmanuel N. Protonotarios. Stability and throughput optimization of multichannel slotted non-persistent CSMA protocol |
959 | -- | 963 | Tzong-Chen Wu. Remote login authentication scheme based on a geometric approach |
964 | -- | 977 | Howard Bowman, Gordon S. Blair, Lynne Blair, Amanda G. Chetwynd. Formal description of distributed multimedia systems: an assessment of potential techniques |
978 | -- | 981 | Tzonelih Hwang, Narn-Yih Lee, Chih-Hung Wang, Ming-Yung Ko. On the security of Wu and Yeh s conference key distribution system |
982 | -- | 987 | Kee Chaing Chua, W. M. Tan, Kin Mun Lye. Performance of PRMA in a mobile radio channel |
988 | -- | 992 | Kwok-Yan Lam. Replay tolerance of authentication protocols |
993 | -- | 996 | Yung-Hsiang Chen, Tzonelih Hwang. ID-based non-interactive zero-knowledge proof system based on one-out-of-two non-interactive oblivious transfer |