Search the dblp DataBase
Radia J. Perlman :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Charlie Kaufman , Radia J. Perlman , Bill Sommerfeld DoS protection for UDP-based protocols. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:2-7 [Conf ] Radia J. Perlman Rbridges: Transparent Routing. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2004, pp:- [Conf ] Radia J. Perlman Fault-Tolerant Broadcast of Routing Information. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1983, pp:93-102 [Conf ] Dah-Ming Chiu , Miriam Kadansky , Radia J. Perlman , John Reynders , Guy L. Steele Jr. , Murat Yuksel Deadlock-Free Routing Based on Ordered Links. [Citation Graph (0, 0)][DBLP ] LCN, 2002, pp:62-71 [Conf ] Radia J. Perlman Mythology and Folklore of Network Protocols. [Citation Graph (0, 0)][DBLP ] LCN, 2002, pp:289-292 [Conf ] Radia J. Perlman What's a PKI, Why Would I Want One, and How Should it Be Designed? [Citation Graph (0, 0)][DBLP ] LISA, 2005, pp:- [Conf ] Yassir Elley , Anne H. Anderson , Steve Hanna , Sean Mullan , Radia J. Perlman , Seth Proctor Building Certifications Paths: Forward vs. Reverse. [Citation Graph (0, 0)][DBLP ] NDSS, 2001, pp:- [Conf ] Radia J. Perlman , Charlie Kaufman Secure Password-Based Protocol for Downloading a Private Key. [Citation Graph (0, 0)][DBLP ] NDSS, 1999, pp:- [Conf ] Radia J. Perlman , Suchitra Raman Techniques for Making IP Multicast Simple and Scalable. [Citation Graph (0, 0)][DBLP ] Networked Group Communication, 1999, pp:270-285 [Conf ] Radia J. Perlman An algorithm for distributed computation of a spanningtree in an extended LAN. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1985, pp:44-53 [Conf ] Radia J. Perlman , E. Stecher , P. Karp Directory services/IBM versus CCITT (panel session, title only). [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1985, pp:105- [Conf ] Radia J. Perlman , George Varghese Pitfalls in the design of distributed routing algorithms. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1988, pp:43-54 [Conf ] Radia J. Perlman Routing Without Tears, Bridging Without Danger. [Citation Graph (0, 0)][DBLP ] USENIX Annual Technical Conference, General Track, 2006, pp:- [Conf ] Radia J. Perlman , Charlie Kaufman Analysis of the IPSec Key Exchange Standard. [Citation Graph (0, 0)][DBLP ] WETICE, 2001, pp:150-156 [Conf ] Radia J. Perlman , George Varghese Transparent interconnection of incompatible local area networks using bridges. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 1987, v:17, n:5, pp:381-389 [Journal ] Radia J. Perlman Fault-Tolerant Broadcast of Routing Information. [Citation Graph (0, 0)][DBLP ] Computer Networks, 1983, v:7, n:, pp:395-405 [Journal ] Radia J. Perlman Hierarchical Networks and the Subnetwork Partition Problem. [Citation Graph (0, 0)][DBLP ] Computer Networks, 1985, v:9, n:, pp:297-303 [Journal ] Ross W. Callon , Radia J. Perlman , I. Michael C. Shand Routing Architecture [Citation Graph (0, 0)][DBLP ] Digital Technical Journal, 1993, v:5, n:1, pp:0-0 [Journal ] Radia J. Perlman , Charlie Kaufman Key Exchange in IPSec: Analysis of IKE. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2000, v:4, n:6, pp:50-56 [Journal ] George Varghese , Radia J. Perlman Transparent Interconnection of Incompatible Local Area Networks Using Bridges. [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1990, v:8, n:1, pp:42-48 [Journal ] File System Design with Assured Delete. [Citation Graph (, )][DBLP ] User-centric PKI. [Citation Graph (, )][DBLP ] Privacy-preserving DRM. [Citation Graph (, )][DBLP ] Search in 0.000secs, Finished in 0.002secs