Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementing RADIUS and Diameter AAA Systems in IPv6-Based Scenarios., , and . AINA, page 851-855. IEEE Computer Society, (2005)Support of Fragmentation of RADIUS Packets., , , , , and . RFC, (April 2015)Providing efficient SSO to cloud service access in AAA-based identity federations., , and . Future Gener. Comput. Syst., (2016)Teaching Advanced Concepts in Computer Networks: VNUML-UM Virtualization Tool., , , , and . IEEE Trans. Learn. Technol., 6 (1): 85-96 (2013)A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP., , , and . Sensors, 17 (11): 2646 (2017)A Framework for Supporting Network Continuity in Vehicular IPv6 Communications., , , , , and . IEEE Intell. Transp. Syst. Mag., 6 (1): 17-34 (2014)A cross-layer SSO solution for federating access to kerberized services in the eduroam/DAMe network., , , and . Int. J. Inf. Sec., 11 (6): 365-388 (2012)Security Analysis and Security Optimizations for the Context Transfer Protocol., , , and . NTMS, page 1-5. IEEE, (2008)Analysis of Handover Key Management schemes under IETF perspective., , , and . Comput. Stand. Interfaces, 32 (5-6): 266-273 (2010)Authentication, Authorization, and Accounting (AAA) Goals for Mobile IPv6., , , , and . RFC, (September 2009)