Author of the publication

Toward a Ubiquitous Mobile Access Model: A Roaming Agreement-Less Approach.

, , , , and . SNPD, page 143-148. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information Security Threats Classification Pyramid., , , and . AINA Workshops, page 208-213. IEEE Computer Society, (2010)A Hybrid Mobile Authentication Model for Ubiquitous Networking., , , , and . TrustCom/BigDataSE/ISPA (1), page 360-367. IEEE, (2015)Toward a Ubiquitous Mobile Access Model: A Roaming Agreement-Less Approach., , , , and . SNPD, page 143-148. IEEE Computer Society, (2010)Beyond Fixed Key Size: Classifications Toward a Balance Between Security and Performance., , , and . AINA, page 1047-1053. IEEE Computer Society, (2010)A Novel Security Approach for Critical Information Systems: Preventing Flooding in the Non-authenticated Client Area Using a New Service from Local Network Service Providers., , , , and . SNPD, page 49-54. IEEE Computer Society, (2010)Flexible Authentication Technique for Ubiquitous Wireless Communication using Passport and Visa Tokens, , , and . CoRR, (2010)Preventing Denial of Service Attacks in Government E-Services Using a New Efficient Packet Filtering Technique., , and . ISPA, page 262-269. IEEE Computer Society, (2011)Evaluating the Functionality of the Token Filtering Technique in Filtering Denial of Service Packets Using a New Formal Evaluation Model., , and . ISPA, page 318-323. IEEE Computer Society, (2011)A New Holistic Security Approach for Government Critical Systems: Flooding Prevention., , , and . ISA, volume 76 of Communications in Computer and Information Science, page 249-264. Springer, (2010)