Author of the publication

Remote User Authentication Scheme with User Anonymity.

, , and . Security and Management, page 412-420. CSREA Press, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bluetree++: A Novel Scatternet Formation Scheme., , , , and . Parallel and Distributed Computing and Networks, page 59-63. IASTED/ACTA Press, (2005)Self-Stabilization Neighborhood Synchronizer for Uniform Rings., , , , and . PDPTA, page 346-352. CSREA Press, (2005)Efficient Date-Constraint Hierarchical Key Assignment Scheme., , and . Security and Management, page 51-57. CSREA Press, (2005)Design and Implementation of Virtual Laboratories Using Wrapping and Agent Techniques., , , , and . IRI, page 450-455. IEEE Systems, Man, and Cybernetics Society, (2004)A Cluster-Based Approach for Efficient Multi-Source Multicasting in MANETs., , , and . Wireless Personal Communications, 57 (2): 255-275 (2011)A SWE-Based Network Management Framework for Environment Monitoring., , , , and . BWCCA, page 472-477. IEEE, (2012)ZERO-Conflict: A Grouping-Based Approach for Automatic Generation of IPSec/VPN Security Policies., , , and . DSOM, volume 4269 of Lecture Notes in Computer Science, page 197-208. Springer, (2006)An efficient k-level traffic control scheme with congestion awareness in wireless mesh networks., , and . Int. J. Ad Hoc Ubiquitous Comput., 12 (3): 129-140 (2013)Energy-efficient data reporting with sink mobility support in object tracking sensor networks., , , , and . Int. J. Ad Hoc Ubiquitous Comput., 10 (3): 123-136 (2012)An efficient anycast scheme for discovering k services in cluster-based mobile ad hoc networks., , , and . Wirel. Commun. Mob. Comput., 11 (9): 1287-1301 (2011)