The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dominique Seret: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dominique Seret, Jae-il Jung
    Translation of user's QoS paremeters into ATM performance requirements. [Citation Graph (0, 0)][DBLP]
    Broadband Communications, 1994, pp:51-64 [Conf]
  2. Martin St-Amand, Boucif Amar Bansaber, Dominique Seret
    A New Key Distribution Scheme for Secure Multicast Communications. [Citation Graph (0, 0)][DBLP]
    ICWI, 2003, pp:1119-1124 [Conf]
  3. Xinxin Zhang, Jean-Luc Tesseron, Christian Remy, Dominique Seret
    Implementation of Access Control in an X.500 Environment. [Citation Graph (0, 0)][DBLP]
    INDC, 1992, pp:41-53 [Conf]
  4. Danièle Dromard, Dominique Seret, Jae-il Jung
    Users' vs Provider's views of Quality of Service in B-ISDN. [Citation Graph (0, 0)][DBLP]
    INDC, 1994, pp:231-245 [Conf]
  5. Jae-il Jung, Dominique Seret
    Translation of QoS Parameters into ATM Performance Parameters in B-ISDN. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1993, pp:748-755 [Conf]
  6. Ibrahima Niang, Frédérique Jacquet, Dominique Seret
    Mechanism for multi-domain marking in DiffServ architecture. [Citation Graph (0, 0)][DBLP]
    ISCC, 2002, pp:15-20 [Conf]
  7. Dominique Seret, Xinxin Zhang
    Network Management with X.500 distributed services. [Citation Graph (0, 0)][DBLP]
    ULPAA, 1994, pp:313-326 [Conf]
  8. Tie Liao, Dominique Seret
    Network management: interoperability and information model. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1991, v:14, n:10, pp:588-597 [Journal]

  9. Peer-to-Peer Overlay Multicast for Scalable Audiovisual Services over Converging Wired and Wireless Networks. [Citation Graph (, )][DBLP]


  10. SAKE - Secure Authenticated Key Establishment in Sensor Networks. [Citation Graph (, )][DBLP]


  11. Kerberos Implementation in Manets. [Citation Graph (, )][DBLP]


  12. Toward the Engineering of Security of Information Systems (ESIS): UML and the IS Confidentiality. [Citation Graph (, )][DBLP]


  13. The Process of Engineering of Security of Information Systems (ESIS): The Formalism of Business Processes. [Citation Graph (, )][DBLP]


Search in 0.037secs, Finished in 0.038secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002