Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Study of Performance Improvement in EAP., and . Networking, volume 4479 of Lecture Notes in Computer Science, page 1183-1186. Springer, (2007)A practical security framework for a VANET-based entertainment service., , and . PM2HW2N@MSWiM, page 175-182. ACM, (2009)Improvements on Hsiang and Shih's Remote User Authentication Scheme Using Smart Cards., and . IEICE Trans. Inf. Syst., 95-D (10): 2393-2400 (2012)Further Improved Remote User Authentication Scheme., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A (6): 1426-1433 (2011)An Empirical Analysis of Incorrect Account Remediation in the Case of Broken Authentication., , , and . IEEE Access, (2023)A group-based security protocol for machine-type communications in LTE-advanced., , and . Wirel. Networks, 21 (2): 405-419 (2015)A Novel Frequency Offset Estimation Algorithm Using Differential Combining for OFDM-Based WLAN Systems., , , , and . International Conference on Computational Science (4), volume 4490 of Lecture Notes in Computer Science, page 360-367. Springer, (2007)A Behavioral Model of Web Traffic., and . ICNP, page 327-334. IEEE Computer Society, (1999)PPNDN: Popularity-based Caching for Privacy Preserving in Named Data Networking., and . ICIS, page 39-44. IEEE Computer Society, (2018)Simulation Framework for Wireless Internet Access Networks., and . International Conference on Computational Science (2), volume 3515 of Lecture Notes in Computer Science, page 453-460. Springer, (2005)