Author of the publication

A Cross-Layer Key Management Scheme for MIPv6 Fast Handover over IEEE 802.11 Wireless LAN.

, , and . Mob. Inf. Syst., (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authenticated IGMP for Controlling Access to Multicast Distribution Tree., and . IEICE Trans. Commun., 92-B (3): 838-849 (2009)Security Architecture and Protocols for Secure MQTT-SN., and . IEEE Access, (2020)Password-Authenticated Key Exchange between Clients with Different Passwords., , , and . ICICS, volume 2513 of Lecture Notes in Computer Science, page 134-146. Springer, (2002)Securing 6LoWPAN Neighbor Discovery., and . IEEE Internet Things J., 8 (17): 13677-13689 (2021)Key De-Synchronization Attack against Yüksel-Nielson's Key Distribution Protocol for ZigBee Wireless Sensor Networks.. IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 97-A (3): 877-880 (2014)One-time password based on hash chain without shared secret and re-registration.. Comput. Secur., (2018)Session Key Agreement Protocol for End-to-End Security in MANET., and . ICCSA (4), volume 3983 of Lecture Notes in Computer Science, page 679-686. Springer, (2006)Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems.. Comput. Networks, 44 (2): 267-273 (2004)A Cross-Layer Key Management Scheme for MIPv6 Fast Handover over IEEE 802.11 Wireless LAN., , and . Mob. Inf. Syst., (2015)Authenticated Fast Handover Scheme in the Hierarchical Mobile IPv6., and . WISA, volume 4298 of Lecture Notes in Computer Science, page 211-224. Springer, (2006)