Author of the publication

Key Distribution Mechanisms for IEEE 802.21-Assisted Wireless Heterogeneous Networks.

, , and . MONAMI, volume 68 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 123-134. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Key Distribution Mechanisms for IEEE 802.21-Assisted Wireless Heterogeneous Networks., , and . MONAMI, volume 68 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 123-134. Springer, (2010)A new Standard for securing media independent handover: IEEE 802.21A., , , , and . IEEE Wirel. Commun., 20 (6): 82-90 (2013)Securing Vehicular IPv6 Communications., , , and . IEEE Trans. Dependable Secur. Comput., 13 (1): 46-58 (2016)A Framework for Supporting Network Continuity in Vehicular IPv6 Communications., , , , , and . IEEE Intell. Transp. Syst. Mag., 6 (1): 17-34 (2014)Trusted Network Access Control in the Eduroam Federation., , , , and . NSS, page 170-175. IEEE Computer Society, (2009)A vehicular network mobility framework: Architecture, deployment and evaluation., , , , and . INFOCOM Workshops, page 127-132. IEEE, (2015)A network access control solution based on PANA for intelligent transportation systems., , , and . ICCVE, page 444-449. IEEE, (2014)Secure three-party key distribution protocol for fast network access in EAP-based wireless networks., , , and . Comput. Networks, 54 (15): 2651-2673 (2010)Mobility and security in a real VANET deployed in a heterogeneous networks., , , and . Secur. Commun. Networks, 9 (3): 208-219 (2016)A Kerberized Architecture for Fast Re-authentication in Heterogeneous Wireless Networks., , , , and . Mob. Networks Appl., 15 (3): 392-412 (2010)