1 |
M. W. Garrett, 'A Service Architecture for ATM: From Applications to Scheduling', IEEE Network May/June 1996
DOI
ScienceOn
|
2 |
B. Preneel, 'Cryptographic hash functions', European Transactions on Telecommunications, vol. 5, pp. 431-448, 1994
DOI
|
3 |
R. C. Merkle, 'One way hash functions and DES', Advances in Cryptology-CRYPTO'89, LNCS, Vol. 435, pp. 428-446, 1990
|
4 |
H. Dobbertin, 'Cryptanalysis of MD-4', D. Gollmann, editor, Fast Software Encryption, Third International Workshop, LNCS, vol. 1039, pp. 71-82, Springer-Verlag, 1996
|
5 |
M. J. Bach, 'The design of the UNIX operating system', ISBN 0-13-201799-7 or ISBN 0-13201757-1 (international ed.). Prentice-Hall 1986.
|
6 |
J. J. Bae and T. Suda, 'Survey of Traffic Control Schemes and Protocols in ATM Networks', IEEE vol. 79, no. 2. February 1991
DOI
ScienceOn
|
7 |
Colella, Callon, Gardner & Rekhter, 'Guidelines for OSI NSAP Allocation in the Internet', RFC 1629, IETF May 1994
|
8 |
ATM Forum, 'LAN Emulation Over ATM Version 1.0', af-lane-0021.000, January 1995
|
9 |
ATM Forum, 'ATM User Network Interface (UNI) Specification Version 3.1', ISBN 0-13393828-X, Prentice Hall, Englewood Cliffs, NJ, June 1995
|
10 |
G. C. Sacket and C. Y. Metz, 'ATM and Multiprotocol Networking', ISBN 0-07-057724-2, McGraw-Hill 1997
|
11 |
I. B. Damgard, 'Collision free hash functions and public key signature schemes', Advances in Cryptology-EUROCRYPT'87, LNCS, vol. 304, pp. 203-216, 1988
|
12 |
R. Anderson, 'The classification of hash functions', P. G. Farrell, editor, Codes and Cyphers: Cryptography and Coding IV, Institute of Mathematics & Its Applications, pp. 83-93, 1995
|