Author of the publication

Formal Evaluation of Major Authentication Methods for IEEE 802.11i WLAN Standard.

, and . VTC Fall, page 1-5. IEEE, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nash equilibria of deception strategies in the IEEE 802.22 cognitive radio networks., and . CCECE, page 1-5. IEEE, (2017)Energy efficiency analysis of a C-RAN with distance - Based power control., , and . CCECE, page 1-5. IEEE, (2017)Average Rate Analysis for the Full-Duplex MISO Interference Channel., and . IEEE Communications Letters, 20 (8): 1579-1582 (2016)A Survey of System Architecture Requirements for Health Care-Based Wireless Sensor Networks., and . Sensors, 11 (5): 4875-4898 (2011)Coverage probability and spectral efficiency for downlink hexagonal cellular networks with Rayleigh fading., and . PIMRC, page 1774-1778. IEEE, (2013)A Survey of Energy Efficient Resource Management Techniques for Multicell Cellular Networks., and . IEEE Commun. Surv. Tutorials, 16 (1): 154-180 (2014)Performance Analysis of IEEE 802.1le WLANs with Throughput and Delay Guarantees., and . VTC Spring, page 1298-1302. IEEE, (2006)Mobility model for heterogeneous wireless networks and its application in common radio resource management., and . IET Commun., 2 (9): 1186-1195 (2008)A Simulation Framework for Performance Evaluation of Network Selection Algorithms in Heterogeneous Wireless Networks., and . VTC Fall, page 1-5. IEEE, (2010)Coverage Probability Analysis of Heterogeneous Cellular Networks in Rician/Rayleigh Fading Environments., and . IEEE Communications Letters, 19 (7): 1197-1200 (2015)