Author of the publication

A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network.

, , and . WISA, volume 3786 of Lecture Notes in Computer Science, page 96-107. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing native analysis with android container., , and . ICMLSC, page 185-189. ACM, (2018)A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network., , and . WISA, volume 3786 of Lecture Notes in Computer Science, page 96-107. Springer, (2005)SecaaS Framework and Architecture: A Design of Dynamic Packet Control., , , and . WISA, volume 8909 of Lecture Notes in Computer Science, page 190-201. Springer, (2014)Evidence collection from car black boxes using smartphones., , , and . CCNC, page 836-837. IEEE, (2011)A Hierarchical Key Management Scheme for Authentication of Roaming Mobile Nodes between Domains in Mobile Networks., and . IEICE Trans. Commun., 89-B (12): 3417-3420 (2006)Impacts of Security Protocols on Real-Time Multimedia Communications., , , and . WISA, volume 3325 of Lecture Notes in Computer Science, page 1-13. Springer, (2004)Implementation of Private Base Station in Android Container Environment for Mobile Communication., , and . ICUFN, page 707-709. IEEE, (2019)Dynamic bandwidth allocation for VBR video traffic using adaptive wavelet prediction., , and . ICC, page 549-553. IEEE, (1998)Virtualization Technologies in the Android Framework and Compatibility with SEAndroid., , , and . WISA, volume 12583 of Lecture Notes in Computer Science, page 167-178. Springer, (2020)Signing key leak detection in Google Play Store., , , and . ICOIN, page 13-16. IEEE Computer Society, (2016)