Secure group communications using key graphs CK Wong, M Gouda, SS Lam IEEE/ACM transactions on networking 8 (1), 16-30, 2000 | 1626 | 2000 |
Secure group communications using key graphs CK Wong, M Gouda, SS Lam ACM SIGCOMM Computer Communication Review 28 (4), 68-79, 1998 | 1156 | 1998 |
Packet switching in a multiaccess broadcast channel: Performance evaluation L Kleinrock, SS Lam Communications, IEEE Transactions on 23 (4), 410-423, 1975 | 750 | 1975 |
Digital signatures for flows and multicasts CK Wong, SS Lam Proceedings Sixth International Conference on Network Protocols (Cat. No …, 1998 | 583 | 1998 |
General AIMD congestion control YR Yang, SS Lam Proceedings 2000 International Conference on Network Protocols, 187-198, 2000 | 556 | 2000 |
A semantic model for authentication protocols TYC Woo, SS Lam Proceedings 1993 IEEE Computer Society Symposium on Research in Security and …, 1993 | 456 | 1993 |
Authentication for distributed systems TYC Woo, SS Lam Computer 25 (1), 39-52, 1992 | 391 | 1992 |
A carrier sense multiple access protocol for local networks SS Lam Computer Networks (1976) 4 (1), 21-32, 1980 | 370 | 1980 |
Batch rekeying for secure group communications XS Li, YR Yang, MG Gouda, SS Lam Proceedings of the 10th international conference on World Wide Web, 525-534, 2001 | 361 | 2001 |
Protocol Verification via Projections SS Lam, AU Shankar | 352 | 1984 |
Packet switching in a multiaccess broadcast channel: Dynamic control procedures SS Lam, L Kleinrock Communications, IEEE Transactions on 23 (9), 891-904, 1975 | 333 | 1975 |
A lesson on authentication protocol design TYC Woo, SS Lam ACM SIGOPS Operating Systems Review 28 (3), 24-37, 1994 | 257 | 1994 |
Reliable group rekeying: A performance analysis YR Yang, XS Li, XB Zhang, SS Lam Proceedings of the 2001 conference on Applications, technologies …, 2001 | 243 | 2001 |
Authorization in Distributed Systems: A New Approach TYC Woo, SS Lam Journal of Computer Security 2 (2-3), 107-136, 1993 | 240 | 1993 |
Packet Broadcast Networks--A Performance Analysis of the R-ALOHA Protocol SS Lam | 219 | 1979 |
Real-time Verification of Network Properties using Atomic Predicates H Yang, SS Lam IEEE International Conference on Network Protocols (ICNP), Göttingen …, 2013 | 216 | 2013 |
Determining end-to-end delay bounds in heterogeneous networks P Goyal, SS Lam, HM Vin Network and Operating Systems Support for Digital Audio and Video: 5th …, 1995 | 213 | 1995 |
Transient behaviors of TCP-friendly congestion control protocols YR Yang, NS Kim, SS Lam Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001 | 208 | 2001 |
Queuing networks with population size constraints SS Lam IBM Journal of Research and Development 21 (4), 370-378, 1977 | 198 | 1977 |
An algorithm for lossless smoothing of MPEG video SS Lam, S Chow, DKY Yau ACM SIGCOMM Computer Communication Review 24 (4), 281-293, 1994 | 197 | 1994 |