Author of the publication

Privacy-Preserving Quick Authentication in Fast Roaming Networks.

, , , and . LCN, page 975-982. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Selective Message Forwarding in Delay Tolerant Networks., , , and . Mob. Networks Appl., 14 (4): 387-400 (2009)An Agenda Based Mobility Model21., , and . Annual Simulation Symposium, page 188-195. IEEE Computer Society, (2006)A Secure Data Transmission Scheme for Mobile Ad Hoc Networks., , , and . GLOBECOM, page 1006-1010. IEEE, (2007)Recent advances in mobility modeling for mobile ad hoc network research., , and . ACM Southeast Regional Conference, page 70-75. ACM, (2004)SMART: A selective controlled-flooding routing for delay tolerant networks., , , and . BROADNETS, page 356-365. IEEE, (2007)Agenda driven mobility modelling., , , , and . Int. J. Ad Hoc Ubiquitous Comput., 5 (1): 22-36 (2010)Delay management in delay-tolerant networks., , , , and . Int. J. Netw. Manag., 18 (6): 521-537 (2008)Nonlinear Resource Allocation in Restoration of Compromised Systems., , and . ICC, page 429-434. IEEE, (2006)Time-Based Confidentiality Enhancement Scheme for Mobile Wireless Networks., , , and . Int. J. Interdiscip. Telecommun. Netw., 1 (1): 80-94 (2009)Resource allocation for restoration of compromised systems., , and . J. Comb. Optim., 12 (1-2): 35-56 (2006)