Author of the publication

Access Authentication Schemes for PMIPV6: A Survey.

, , , and . IMIS, page 355-360. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reliability analysis with linguistic data: An evidential network approach., , and . Reliab. Eng. Syst. Saf., (2017)Transfer Learning for SAR Image Classification Via Deep Joint Distribution Adaptation Networks., , , and . IEEE Trans. Geosci. Remote. Sens., 58 (8): 5377-5392 (2020)Assessment of E-Commerce security using AHP and evidential reasoning., , , and . Expert Syst. Appl., 39 (3): 3611-3623 (2012)A multi-source information fusion method for ship target recognition based on Bayesian inference and evidence theory., , , and . J. Intell. Fuzzy Syst., 42 (3): 2331-2346 (2022)Discrete choice models with Atanassov-type intuitionistic fuzzy membership degrees., , and . Inf. Sci., (April 2023)An improved belief structure satisfaction to uncertain target values by considering the overlapping degree between events., and . Inf. Sci., (2021)A total uncertainty measure for D numbers based on belief intervals., and . CoRR, (2018)An Anonymous Authentication Scheme based on PMIPv6 for VANETs., , , and . IEEE Access, (2018)A location privacy protection scheme based on random encryption period for VSNs., , and . J. Ambient Intell. Humaniz. Comput., 11 (3): 1351-1359 (2020)A Novel Discount-Weighted Average Fusion Method Based on Reinforcement Learning For Conflicting Data., , , and . IEEE Syst. J., 17 (3): 4748-4751 (September 2023)