Author of the publication

User Access Control and Authentication System for VoIP Service in Mobile Communication Environments.

, , , and . IJDSN, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

QoS routing mechanism using mobility prediction of node in ad-hoc network., , and . MOBIWAC, page 53-60. ACM, (2008)An Active Node Management System for Secure Active Networks., , and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 904-913. Springer, (2005)A Study on Optimization for Acquisition and Processing of Massive Battlefield Information for Korean NCW., , , and . FGIT-GDC/IESH/CGAG, volume 351 of Communications in Computer and Information Science, page 139-145. Springer, (2012)User Access Control and Authentication System for VoIP Service in Mobile Communication Environments., , , and . IJDSN, (2014)The Design of Reliable Routing Protocols in Wireless Mesh Networks., , , , and . ICHIT (1), volume 6935 of Lecture Notes in Computer Science, page 162-174. Springer, (2011)Design of Anonymity-Preserving User Authentication and Key Agreement Protocol for Ubiquitous Computing Environments., , and . WINE, volume 3828 of Lecture Notes in Computer Science, page 491-499. Springer, (2005)Anomaly Detection Using Sequential Properties of Packets in Mobile Environment., and . ICCSA (1), volume 3043 of Lecture Notes in Computer Science, page 1060-1068. Springer, (2004)A genetic algorithm for sensor deployment based on two-dimensional operators., , , and . SAC, page 1812-1813. ACM, (2008)Anomaly Detection Scheme Using Data Mining in Mobile Environment., and . ICCSA (2), volume 2668 of Lecture Notes in Computer Science, page 21-30. Springer, (2003)