Author of the publication

Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks.

, , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A scalable and secure VPLS architecture for provider provisioned networks., and . WCNC, page 1115-1120. IEEE, (2013)Improving the tunnel management performance of secure VPLS architectures with SDN., , and . CCNC, page 530-536. IEEE, (2016)Convergence of ICN and MEC for 5G: Opportunities and Challenges., , and . IEEE Commun. Stand. Mag., 4 (4): 64-71 (2020)Distributed-Proof-of-Sense: Blockchain Consensus Mechanisms for Detecting Spectrum Access Violations of the Radio Spectrum., , , , , , and . IEEE Trans. Cogn. Commun. Netw., 9 (5): 1110-1125 (October 2023)A Survey on Role of Blockchain for IoT: Applications and Technical Aspects., , , , and . Comput. Networks, (May 2023)Integration of ICN and MEC in 5G and Beyond Networks: Mutual Benefits, Use Cases, Challenges, Standardization, and Future Research., , , , , , and . IEEE Open J. Commun. Soc., (2022)A Novel Blockchain-as-a-Service (BaaS) Platform for Local 5G Operators., , , , and . IEEE Open J. Commun. Soc., (2021)Federated Learning for the Healthcare Metaverse: Concepts, Applications, Challenges, and Future Directions., , , , , , , , , and . IEEE Internet Things J., 10 (24): 21873-21891 (December 2023)Securing Gadget-Free Digital Services., , , , , and . Computer, 51 (11): 66-77 (2018)The role of security orchestrator in network slicing for future networks., and . J. Commun. Networks, 25 (3): 355-369 (June 2023)