Author of the publication

Improving security level of LTE authentication and key agreement procedure.

, , , , and . GLOBECOM Workshops, page 1032-1036. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments., , , , , and . IEEE Access, (2018)Designing A Healthcare Authorization Model Based On Cloud Authentication., , , and . Intell. Autom. Soft Comput., 20 (3): 365-379 (2014)A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS by Using a Data Connection Core., , , , and . BWCCA, page 360-365. IEEE, (2013)A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks., , and . ARES, volume 6908 of Lecture Notes in Computer Science, page 255-270. Springer, (2011)The simulation of an emotional robot implemented with fuzzy logic., , , and . Soft Comput., 18 (9): 1729-1743 (2014)High-Efficient Multi-key Exchange Protocol Based on Three-Party Authentication., , , , and . IMIS, page 487-492. IEEE Computer Society, (2014)Building a block cipher mode of operation with feedback keys., , , , , , and . ISIE, page 1-4. IEEE, (2013)A secure wireless communication system by integrating RSA and Diffie-Hellman PKDS in 4G environments and an intelligent protection-key chain with a data connection core., , , , and . ISIE, page 1-6. IEEE, (2013)A Secure Mobile Shopping System Based on Credit Card Transaction., , , , and . INCoS, page 336-341. IEEE, (2014)A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation., , and . CD-ARES, volume 7465 of Lecture Notes in Computer Science, page 578-592. Springer, (2012)