Author of the publication

Design and evaluation of distributed and dynamic mobility management approach based on PMIPv6 and MIH protocols.

, , , and . Wireless Networks, 21 (8): 2747-2763 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Depth error concealment based on decision making., , , and . ICSIPA, page 193-196. IEEE, (2013)Global Communications Newsletter., , , , , , , , , and 8 other author(s). IEEE Communications Magazine, 55 (1): 13-16 (2017)A new cooperative spectrum sensing scheme based on discrete cosine transform., , , and . ISTT, page 108-111. IEEE, (2016)An investigation of vegetation effect on the performance of IEEE 802.11n technology at 5.18 GHz., , , , , , and . ICWCA, page 1-6. IEEE, (2012)On the authentication and re-authentication protocols in LTE-WLAN interworking architecture., , , , and . Trans. Emerg. Telecommun. Technol., (2017)Probability-based opportunity dynamic adaptation (PODA) of contention window for home M2M networks., , , , and . J. Netw. Comput. Appl., (2019)A Survey and Taxonomy on Medium Access Control Strategies for Cooperative Communication in Wireless Networks: Research Issues and Challenges., , , , and . IEEE Commun. Surv. Tutorials, 18 (4): 2493-2521 (2016)Second and subsequent fragments headers compression scheme for IPv6 header in 6LoWPAN network., , , , and . ICST, page 771-776. IEEE, (2013)Normalized Advancement Based Totally Opportunistic Routing Algorithm With Void Detection and Avoiding Mechanism for Underwater Wireless Sensor Network., , , , and . IEEE Access, (2020)Secure and Self-healing Control Centers of Critical Infrastructures using Intrusion Tolerance., , and . Int. J. Netw. Secur., 17 (4): 365-382 (2015)