Author of the publication

A Secure Mutual Authentication Protocol for Roaming in Wireless Mesh Networks.

, , and . J. Networks, 7 (2): 267-274 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Periodic Action Temporal Localization Method Based on Two-Path Architecture for Product Counting in Sewing Video., , , , and . ICIC (3), volume 11645 of Lecture Notes in Computer Science, page 568-580. Springer, (2019)PON: Proposal Optimization Network for Temporal Action Proposal Generation., , and . ICIC (3), volume 12465 of Lecture Notes in Computer Science, page 145-157. Springer, (2020)Finding the anti-block vital edge of a shortest path between two nodes., , and . J. Comb. Optim., 16 (2): 173-181 (2008)Complexity Reduction for Direction of Arrival Estimation with Massive MIMO., , , , and . VTC Fall, page 1-5. IEEE, (2016)The parameter optimization based on LVPSO algorithm for detecting multi-step attacks., , , , , and . CF, page 24-31. ACM, (2019)Improving energy-efficiency of large-scale workflows in heterogeneous systems., and . Int. J. Comput. Sci. Eng., 13 (3): 258-267 (2016)An energy-efficient adaptive resource provision framework for cloud platforms., and . Int. J. Comput. Sci. Eng., 13 (4): 346-354 (2016)An automated and multi-parametric algorithm for objective analysis of meibography images., , , , and . CoRR, (2020)Three-side Gaming Model for Resource Co-allocation in Grid Computing., , and . J. Softw., 7 (9): 2125-2132 (2012)Access Authentication Scheme Based on Authorized Certificate in Wireless Mesh Networks., , and . J. Networks, 9 (1): 231-237 (2014)