Author of the publication

An authentication protocol offering service anonymity of mobile device in ubiquitous environment.

. J. Supercomput., 62 (1): 105-117 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VBSM: VCC-Based Black Box Service Model with Enhanced Data Integrity., , and . Information, 5 (4): 526-534 (2014)Scenario-Based Digital Forensics Challenges in Cloud Computing., , and . Symmetry, 8 (10): 107 (2016)A Reliable TTP-Based Infrastructure with Low Sensor Resource Consumption for the Smart Home Multi-Platform., , and . Sensors, 16 (7): 1036 (2016)Design and implementation of light-weight mobile multicast for fast MIPv6., , , , and . Comput. Commun., 32 (3): 552-559 (2009)A user experience environment model for human activity simulation., , and . Future Gener. Comput. Syst., (2019)Monitoring user activities in smart home environments., , and . Inf. Syst. Frontiers, 11 (5): 537 (2009)Multimedia technology for pervasive computing environment., , and . J. Supercomput., 65 (1): 258-261 (2013)Efficient localization scheme with ring overlapping by utilizing mobile anchors in wireless sensor networks., , , , and . ACM Trans. Embed. Comput. Syst., 12 (2): 20:1-20:18 (2013)Multi-path transmission control scheme combining bandwidth aggregation and packet scheduling for real-time streaming in multi-path environment., , , and . IET Commun., 4 (8): 937-945 (2010)Energy efficient virtual MIMO communication for wireless sensor networks., , and . Telecommun. Syst., 42 (1-2): 139-149 (2009)