2004 | ||
---|---|---|
5 | M. M. McMahon: A Hub-and-Spoke Network for Global Network-Centric Applications. PDPTA 2004: 97-102 | |
4 | M. M. McMahon: A Component-Based Application Development, Test, and Evaluation Environment for Network Applications. Software Engineering Research and Practice 2004: 760-768 | |
2003 | ||
3 | M. M. McMahon, D. M. Needham, J. B. Datko: Performance of a Jini-based Ad Hoc Network Authentication Scheme. ISCA PDCS 2003: 442-447 | |
2 | D. M. Needham, M. M. McMahon, J. B. Datko: Ad Hoc Network Authentication: A Jini-Based Approach. International Conference on Wireless Networks 2003: 549-553 | |
2001 | ||
1 | M. M. McMahon, Howard A. Sholl, Reda A. Ammar: Proposed Structure of a Network Security System Using Dynamic Authentication. ISCA PDCS 2001: 183-189 |
1 | Reda A. Ammar | [1] |
2 | J. B. Datko | [2] [3] |
3 | D. M. Needham | [2] [3] |
4 | Howard A. Sholl | [1] |