Author of the publication

A Leakage-Resilient and Forward-Secure Authenticated Key Exchange Protocol for Private Personal Area Networks.

, , , , , and . PIMRC, page 1-5. IEEE, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Leakage-Resilient and Forward-Secure Authenticated Key Exchange Protocol for Private Personal Area Networks., , , , , and . PIMRC, page 1-5. IEEE, (2006)A New Security Architecture for Personal Networks., , , , , and . GLOBECOM, IEEE, (2006)Protocols for purpose-restricted anonymous communications in IP-based wireless networks., , , and . Comput. Commun., 31 (15): 3662-3671 (2008)Multi-receiver authentication code for network coding., and . Allerton, page 1225-1231. IEEE, (2008)On VoIP session setup delay using SIP over correlated fading channels., , and . PIMRC, page 2211-2215. IEEE, (2005)Mobility management for VoIP: evaluation of mobile IP-based protocols., , and . ICC, page 3230-3235. IEEE, (2005)Optimization of VoIP session setup delay over wireless links using SIP., , and . GLOBECOM, page 4092-4096. IEEE, (2004)Defining 4G technology from the user's perspective., , , , and . IEEE Netw., 20 (1): 35-41 (2006)An Authentication Code against Pollution Attacks in Network Coding, and . CoRR, (2009)A Pragmatic Methodology to Design 4G: From the User to the Technology., , , , and . ICN (1), volume 3420 of Lecture Notes in Computer Science, page 366-373. Springer, (2005)