Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography., , , and . Comput. Networks, (2017)Efficient and Provably Secure Distributed Signing Protocol for Mobile Devices in Wireless Networks., , , , and . IEEE Internet of Things Journal, 5 (6): 5271-5280 (2018)Balancing energy consumption with mobile agents in wireless sensor networks., , , and . Future Gener. Comput. Syst., 28 (2): 446-456 (2012)Integration of VANET and 5G Security: A review of design and implementation issues., , and . Future Gener. Comput. Syst., (2019)Throughout optimization for multimedia applications over high speed networks., , and . HPN, volume 87 of IFIP Conference Proceedings, page 101-114. Chapman & Hall, (1997)Cyberwar: The What, When, Why, and How Commentary., and . IEEE Technol. Soc. Mag., 33 (3): 14-21 (2014)An Anonymous Secure Payment Protocol in a Payment Gateway Centric Model., and . ANT/MobiWIS, volume 10 of Procedia Computer Science, page 758-765. Elsevier, (2012)HARMONICA: Enhanced QoS Support with Admission Control for IEEE 802.11 Contention-based Access., and . IEEE Real-Time and Embedded Technology and Applications Symposium, page 64-73. IEEE Computer Society, (2004)Efficient Revocable ID-Based Signature With Cloud Revocation Server., , , and . IEEE Access, (2017)FASPM: Fuzzy logic-based adaptive security protocol for multihop data dissemination in intelligent transport systems., , , and . Trans. Emerg. Telecommun. Technol., (2017)