From post

Efficient 3G/WLAN Interworking Techniques for Seamless Roaming Services with Location-Aware Authentication.

, , , , , и . NETWORKING, том 3462 из Lecture Notes in Computer Science, стр. 370-381. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The efficient communications for VPN access of mobile nodes over mobile IPV6., , и . ICWI, стр. 941-944. IADIS, (2004)Protecting IPTV Service Network against Malicious Rendezvous Point., , , и . WISA, том 5932 из Lecture Notes in Computer Science, стр. 1-9. Springer, (2009)An Automatic Security Evaluation System for IPv6 Network., , , , и . WISA, том 2908 из Lecture Notes in Computer Science, стр. 150-161. Springer, (2003)Effective Control of Abnormal Neighbor Discovery Congestion on IPv6 Local Area Network., и . UIC, том 4159 из Lecture Notes in Computer Science, стр. 966-976. Springer, (2006)An Optimized Time-constraint Job Distribution Scheme in Group based P2P Networks., , , и . SERA, стр. 774-781. IEEE Computer Society, (2007)Efficient 3G/WLAN Interworking Techniques for Seamless Roaming Services with Location-Aware Authentication., , , , , и . NETWORKING, том 3462 из Lecture Notes in Computer Science, стр. 370-381. Springer, (2005)Security Clustering: A Network-Wide Secure Computing Mechanism in Pervasive Computing., , , , и . NETWORKING, том 3042 из Lecture Notes in Computer Science, стр. 1326-1331. Springer, (2004)Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications., , , , , и . ACISP, том 2727 из Lecture Notes in Computer Science, стр. 180-191. Springer, (2003)Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks., , , , и . WISA, том 4298 из Lecture Notes in Computer Science, стр. 282-296. Springer, (2006)A Freshness Based Persistent Assurance Scheme for Secure Scalable Media Distribution., , и . CDVE, том 6240 из Lecture Notes in Computer Science, стр. 97-100. Springer, (2010)