Dan M. Nessett Interactive terminal services in a heterogeneous distributed system. [Citation Graph (0, 0)][DBLP] ACM SIGOPS European Workshop, 1986, pp:- [Conf]
Dan M. Nessett Factors Affecting Distributed System Security. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1986, pp:204-222 [Conf]
Dan M. Nessett Layering Central Authentication on Existing Distributed System Terminal Services. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1989, pp:290-299 [Conf]
Dan M. Nessett The Effectiveness of cache Memories in a Multiprocessor Environment. [Citation Graph (0, 0)][DBLP] Australian Computer Journal, 1975, v:7, n:1, pp:33-38 [Journal]
Dan M. Nessett Identifier Protection in a Distributed Operating System. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 1982, v:16, n:1, pp:26-31 [Journal]
Dan M. Nessett A Critique of the Burrows, Abadi and Needham Logic. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 1990, v:24, n:2, pp:35-38 [Journal]
Dan M. Nessett Factors Affecting Distributed System Security. [Citation Graph (0, 0)][DBLP] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:233-248 [Journal]
Search in 0.005secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP