Author of the publication

On the authentication and re-authentication protocols in LTE-WLAN interworking architecture.

, , , , and . Trans. Emerg. Telecommun. Technol., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Efficient Distance Studies: Online Course Management System (CMS)., , and . HCI (35), volume 12796 of Lecture Notes in Computer Science, page 113-125. Springer, (2021)Arabic light-based stemmer using new rules., , , , and . J. King Saud Univ. Comput. Inf. Sci., 34 (9): 6635-6642 (2022)An Efficient Game Theory-Based Power Control Algorithm for D2D Communication in 5G Networks., , , , , , and . KSII Trans. Internet Inf. Syst., 15 (7): 2631-2649 (2021)Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks., , , , and . EURASIP J. Wirel. Commun. Netw., 2020 (1): 105 (2020)An Efficient Game Theory-Based Power Control Algorithm for D2D Communication in 5G Networks., , , , , , and . CoRR, (2023)Normalized Advancement Based Totally Opportunistic Routing Algorithm With Void Detection and Avoiding Mechanism for Underwater Wireless Sensor Network., , , , and . IEEE Access, (2020)On the authentication and re-authentication protocols in LTE-WLAN interworking architecture., , , , and . Trans. Emerg. Telecommun. Technol., (2017)Authentication process enhancements in WiMAX networks., , , , and . Secur. Commun. Networks, 9 (17): 4703-4725 (2016)Hybrid Multi-Level Detection and Mitigation of Clone Attacks in Mobile Wireless Sensor Network (MWSN)., , , and . Sensors, 20 (8): 2283 (2020)Dynamic Job Scheduling Strategy Using Jobs Characteristics in Cloud Computing., , , , and . Symmetry, 12 (10): 1638 (2020)