Author of the publication

A comparison study between the TLS-based security framework and IKEv2 when protecting DSMIPv6 signaling.

, , and . Comput. Stand. Interfaces, 36 (3): 489-500 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A comparison study between the TLS-based security framework and IKEv2 when protecting DSMIPv6 signaling., , and . Comput. Stand. Interfaces, 36 (3): 489-500 (2014)Question Answering over Linked Data with GPT-3., , and . SLATE, volume 113 of OASIcs, page 1:1-1:15. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2023)The Joint Role of Batch Size and Query Strategy in Active Learning-Based Prediction - A Case Study in the Heart Attack Domain., , , and . EPIA, volume 13566 of Lecture Notes in Computer Science, page 464-475. Springer, (2022)Enterprise Social Network Success: Evidences from a Multinational Corporation., and . EMCIS, volume 299 of Lecture Notes in Business Information Processing, page 197-203. Springer, (2017)Performance analysis of Mobile IPv6 support for Dual Stack hosts., and . AICCSA, page 92-100. IEEE Computer Society, (2014)Interference-robust waveform for LiDAR., , , , and . VTC Fall, page 1-6. IEEE, (2023)SatSysSim: A Novel Event-Driven Simulation Framework for DVB/RCS2 Performance Characterization., , , , and . IEEE Access, (2022)Performance Analysis of a Foreground Segmentation Neural Network Model., , , and . CoRR, (2021)Internet-based solutions in the development and operation of an unmanned robotic airship., , , , , , , and . Proc. IEEE, 91 (3): 463-474 (2003)Parameter identification of an airship model using evolution strategies., and . IEEE Congress on Evolutionary Computation, page 1493-1499. IEEE, (2003)