Vulnerabilities of network control protocols: an example

Eric C. Rosen. Vulnerabilities of network control protocols: an example. Computer Communication Review, 11(3):10-16, 1981. [doi]

Authors

Eric C. Rosen

This author has not been identified. Look up 'Eric C. Rosen' in Google