Author of the publication

Exploring Efficient Imperative Handover Mechanisms for Heterogeneous Wireless Networks.

, , , , , and . NBiS, page 286-291. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security analysis of the constrained application protocol in the Internet of Things., , and . FGCT, page 163-168. IEEE, (2013)DCSS Protocol for Data Caching and Sharing Security in a 5G Network., , and . Network, 1 (2): 75-94 (2021)Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR., and . Int. J. Commun. Syst., 27 (12): 3600-3618 (2014)Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain., , , , , and . Internet Things, (December 2023)Securing Address Registration in Location/ID Split Protocol Using ID-Based Cryptography., , and . WWIC, volume 7889 of Lecture Notes in Computer Science, page 129-139. Springer, (2013)An integrated authentication and authorization approach for the network of information architecture., and . J. Netw. Comput. Appl., (2015)Exploring Multi-homing Issues in Heterogeneous Environments., , , and . AINA Workshops, page 690-695. IEEE Computer Society, (2011)Virtualization and Cyber Security: Arming Future Security Practitioners., , , and . TrustCom/BigDataSE/ISPA (1), page 1398-1402. IEEE, (2015)A Survey on Authentication and Key Agreement Protocols in Heterogeneous Networks, , and . CoRR, (2012)Mobile femtocell utilisation in LTE vehicular environment: Vehicular penetration loss elimination and performance enhancement., , , , and . Veh. Commun., (2017)