Author of the publication

An experimental study of security for service function chaining.

, , , and . ICUFN, page 797-799. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Study of the Controlling Resonant Wireless Power Transfer Using Bluetooth Communication., , , and . ICCSA (4), volume 8582 of Lecture Notes in Computer Science, page 779-789. Springer, (2014)An experimental study of security for service function chaining., , , and . ICUFN, page 797-799. IEEE, (2017)PMIP-Based Distributed Session Mobility Management for 5G Mobile Network., and . ICOIN, page 453-456. IEEE, (2019)Enhanced LISP Mapping System for Optimizing Service Path in Edge Computing Environment., and . IEEE Access, (2020)Distributed cell selection for scheduling function in 6TiSCH networks., , and . Comput. Stand. Interfaces, (2017)Implementation of Bistatic Backscatter Wireless Communication System Using Ambient Wi-Fi Signals., , , , , and . KSII Trans. Internet Inf. Syst., 11 (2): 1250-1264 (2017)Multicast Mobility Routing Optimizations for Proxy Mobile IPv6., , , , and . RFC, (September 2013)A Network Service Permission Control Platform for Service Function Chaining., and . ICOIN, page 151-156. IEEE, (2017)Receiver-Based Rate Control with One-Way Trip Time for Multimedia Applications., , and . ICOIN, volume 3961 of Lecture Notes in Computer Science, page 641-649. Springer, (2006)An Information-centric NFV-based System Implementation for Disaster Management Services., , , and . ICOIN, page 807-810. IEEE, (2020)