Author of the publication

A mobility-based load control scheme at mobility anchor point in hierarchical mobile IPv6 networks.

, , and . GLOBECOM, page 3431-3435. IEEE, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Erratum to: "Digital signature algorithm for securing digital identities": Information Processing Letters 82 (2002) 247-252.. Inf. Process. Lett., 88 (4): 201-202 (2003)Temporal fairness guarantee in multi-rate wireless LANs for per-flow protection., , , and . Wireless Networks, 13 (2): 237-258 (2007)Biometric Authentication for Border Control Applications., and . IEEE Trans. Knowl. Data Eng., 20 (8): 1091-1096 (2008)Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface, , , , and . CoRR, (2011)Energy-Efficient Itinerary Planning for Mobile Agents in Wireless Sensor Networks., , , , and . ICC, page 1-5. IEEE, (2009)An iterative analysis of single-hop B-MAC networks under Poisson traffic., , and . J. Commun. Networks, 14 (1): 40-50 (2012)Itinerary Planning for Energy-Efficient Agent Communications in Wireless Sensor Networks., , , , and . IEEE Trans. Veh. Technol., 60 (7): 3290-3299 (2011)Reducing Handover Delay by Location Management in Mobile WiMAX Multicast and Broadcast Services., , , and . IEEE Trans. Vehicular Technology, 60 (2): 605-617 (2011)Robust Software Tokens: Towards Securing a Digital Identity.. IACR Cryptology ePrint Archive, (2001)A comparative study of mobility anchor point selection schemes in hierarchical mobile IPv6 networks., , and . Mobility Management & Wireless Access Protocols, page 130-131. ACM, (2004)