2002 | ||
---|---|---|
7 | EE | Alan Harbitter, Daniel A. Menascé: A methodology for analyzing the performance of authentication protocols. ACM Trans. Inf. Syst. Secur. 5(4): 458-491 (2002) |
2001 | ||
6 | EE | Alan Harbitter, Daniel A. Menascé: The performance of public key-enabled kerberos authentication in mobile computing applications. ACM Conference on Computer and Communications Security 2001: 78-85 |
5 | EE | Alan Harbitter, Daniel A. Menascé: Performance of Public-Key-Enabled Kerberos Authentication in Large Networks. IEEE Symposium on Security and Privacy 2001: 170-183 |
1998 | ||
4 | Alan Harbitter, Daniel A. Menascé: Performance Issues in Large Distributed System Security. Int. CMG Conference 1998: 456-467 | |
1990 | ||
3 | Alan Harbitter: Hybrid Techniques in Benchmarking: A Scalable Approach. Int. CMG Conference 1990: 387-394 | |
1982 | ||
2 | Alan Harbitter, Satish K. Tripathi: A Model of Transport Level Flow Control. SIGMETRICS Performance Evaluation Review 11(4): 222-232 (1982) | |
1 | Satish K. Tripathi, Alan Harbitter: An Analysis of Two Flow Control Techniques. SIGMETRICS Performance Evaluation Review 11(4): 241-249 (1982) |
1 | Daniel A. Menascé | [4] [5] [6] [7] |
2 | Satish K. Tripathi | [1] [2] |