Author of the publication

Secure Protocol for Fast Authentication in EAP-Based Wireless Networks.

, , and . ICCSA (2), volume 4706 of Lecture Notes in Computer Science, page 1038-1051. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DJ-boids: emergent collective behavior as multichannel radio station programming., , and . IUI, page 248-250. ACM, (2003)LightPS: Lightweight Content-Based Publish/Subscribe for Peer-to-Peer Systems., , and . CISIS, page 342-347. IEEE Computer Society, (2008)Access Control In Multicast Environments: An Approach to Senders Authentication., , and . LANOMS, (1999)An analysis of positioning and map-matching issues for GNSS-based road user charging., , , , and . ITSC, page 1486-1491. IEEE, (2010)Shifting primes: Optimizing elliptic curve cryptography for 16-bit devices without hardware multiplier., , and . Math. Comput. Model., 58 (5-6): 1155-1174 (2013)Performance Evaluation of Interconnection Mechanisms for Ad Hoc Networks across Mobility Models., , and . J. Networks, 1 (2): 9-17 (2006)Mobility-aware mesh construction algorithm for low data-overhead multicast ad hoc routing., and . J. Commun. Networks, 6 (4): 331-342 (2004)OpenIKEv2: Design and Implementation of an IKEv2 Solution., , , , , and . IEICE Trans. Inf. Syst., 91-D (5): 1319-1329 (2008)Towards a Peer-to-Peer Object Middleware for Wide-Area Collaborative Application Development., , , and . Inteligencia Artif., 8 (24): 55-65 (2004)Data mining for text categorization with semi-supervised agglomerative hierarchical clustering., , and . Int. J. Intell. Syst., 15 (7): 633-646 (2000)