Author of the publication

Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management".

, , , , , , , , and . ICIN, page 112-116. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On confidence bounds for one-parameter exponential families., , , , and . Commun. Stat. Simul. Comput., 46 (2): 1569-1582 (2017)An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems., , , and . Int. J. Intell. Syst., 37 (12): 10158-10171 (December 2022)Energy Efficient Routing in Wireless Sensor Networks Based on Fuzzy Ant Colony Optimization., , , , and . Int. J. Distributed Sens. Networks, (2014)Identifying Benefits and risks associated with utilizing cloud computing., , , , and . CoRR, (2014)The application of internet of things in healthcare: a systematic literature review and classification., , , , , and . Univers. Access Inf. Soc., 18 (4): 837-869 (2019)Full-adaptive THEN-part equipped fuzzy wavelet neural controller design of FACTS devices to suppress inter-area oscillations., and . Neurocomputing, (2013)Secure ticket-based authentication method for IoT applications., , and . Digit. Commun. Networks, 9 (3): 710-716 (June 2023)Exponentiated power Lindley power series class of distributions: Theory and applications., , , , and . Commun. Stat. Simul. Comput., 47 (9): 2499-2531 (2018)A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing., , , , and . ACM Trans. Internet Techn., 21 (4): 82:1-82:16 (2021)Comparison of Data Hiding Techniques for Video Watermarking Applications., , , , , and . ICCCS, page 168-173. IEEE, (2022)