Author of the publication

P2P architecture over IPv6 for personal internetworking.

, , , and . Int. J. Internet Protoc. Technol., 1 (4): 214-220 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A survey of key distribution in wireless sensor networks: A survey of key distribution in wireless sensor networks, and . Security and Communication Networks, (Jul 1, 2011)A Trust Management Scheme for Enhancing Security in Pervasive Wireless Networks., , , , and . GLOBECOM, page 1-6. IEEE, (2009)A survey of black hole attacks in wireless mobile ad hoc networks., , and . HCIS, (2011)An Efficient Charger Planning Mechanism of WRSN Using Simulated Annealing Algorithm., , , , and . SMC, page 2585-2590. IEEE, (2015)A queue-based prolong lifetime methods for wireless sensor node., , , and . Comput. Commun., 35 (9): 1098-1106 (2012)A genetic algorithm for energy-efficient based multicast routing on MANETs., , , and . Comput. Commun., 31 (10): 2632-2641 (2008)Cross-layer wireless video adaptation: Tradeoff between distortion and delay., , , , and . Comput. Commun., 33 (14): 1615-1622 (2010)Guest Editorial: Theme Issue on Smartphone Applications and Services for Pervasive Computing, , , and . Personal and Ubiquitous Computing, 16 (6): 611-612 (2012)Modeling and verifying EPC network intrusion system based on timed automata., , , and . Pervasive Mob. Comput., (2015)Service integration with UPnP agent for an ubiquitous home environment., , and . Inf. Syst. Frontiers, 11 (5): 483-490 (2009)