Bruyeron et al. “Experimentations with TCP Selective Acknowledgement” ACM SIGCOMM, pp. 54-77, vol. 28, iss. 2: Apr., 1998.* |
“Design for a Simple Network Management Protocol Subagent for Internet Firewalls”, IBM Technical Disclosure Bulletin, vol. 40, No. 03, Mar. 1997, pp. 63-68. |
“Fusion Power? [virtual private networks]”, Information Week, No. 50, Jan. 1999, pp. 29-31. |
“Making the Move to VPN Tunneling”, Telecommunications (International Edition), vol. 32, No. 10, Oct. 1998, pp. 87-88. |
“The ABCs of Remote Access VPNs”, Business Communications Review, vol. 28, No. 10, Oct. 1998, pp. 47-50. |
“Secure Web Tunneling”, Computer Networks and ISDNtems, vol. 30, No. 1-7, Apr. 1998 pp. 531-539. |
“A Public-Key Based Secure Mobile IP”, Proceedings of the Third Annual ACM/IEEE International Conference on Mobile Computing and Networking, 1997, pp. 173-184. |
“Extend your Net with VPNs”, BYTE (International Edition), vol. 22, No. 11, Nov. 1997, pp. 114-119. |
“Mobile IP”, International Journal of Communication Systems, vol. 11, No. 1, Jan.-Feb. 1998 pp. 3-20. |
“A New Scheme of Connectionless Transmission over ATM with Scalability and Cut-Through Techniques”, ISS'97: World Telecommunications Congress. ‘Global Network Evolution: Convergence or Collision?’ Proceedings, Pt. vol. 1, pp. 199-206. |
“Low-loss TCP/IP Header Compression for Wireless Networks”, Dept. of Comput. Sci., Lulea Univ. of Technol., Sweden, Wireless Networks, vol. 3, No. 5, 1997, pp. 375-387. |
“HIPPI over ATM Networks: Extending Connections for Distributed Computing”, IEEE Concurrency, vol. 5, No. 4, Oct.-Dec. 1997, pp. 40-53. |
“Dial-in Virtual Private Networks Using Layer 3 Tunneling”, Proceedings, 22nd Annual Conference on Local Computer Networks, LCN'97, Nov. 2-5, 1997, pp. 555-561. |
“A Virtual Private Affair”, BYTE, vol. 22, No. 7, Nov. 1997, pp. 79-80. |
“Securing the Internet Protocol”, Proceedings of the Fourteenth Annual ACM Symposium on Principles of Distributed Computing, 1995, pp. 257. |
“Hybrid Internet Access”, AIP Conference Proceedings, 1995, No. 325, pp. 69-74. |
“Performance Evaluation of Multicast Rerouting Scheme for Handover in Mobile IP”, Journal of KISS (Computer Systems and Theory), vol. 25, No. 8, Aug. 1998, pp. 867-876. |