Author of the publication

A Novel Overlay Network for a Secure Global Home Agent Dynamic Discovery.

, , , and . OTM Workshops (2), volume 4806 of Lecture Notes in Computer Science, page 921-930. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dissecting the protocol and network traffic of the OnLive cloud gaming platform., , , , , and . Multim. Syst., 20 (5): 451-470 (2014)Security architecture for law enforcement agencies., , , and . Multim. Tools Appl., 75 (17): 10709-10732 (2016)Routing Fairness in Chord: Analysis and Enhancement., , and . INFOCOM, page 1449-1457. IEEE, (2009)A Model to Quantify the Success of a Sybil Attack Targeting RELOAD/Chord Resources., , , and . IEEE Commun. Lett., 17 (2): 428-431 (2013)Evaluation of Greedy and CBF for ETSI non-area GeoNetworking: The impact of DCC., , , and . CoRR, (2024)A Bloom Filter-Based Monitoring Station for a Lawful Interception Platform., , , and . MCSS, volume 429 of Communications in Computer and Information Science, page 214-228. Springer, (2014)Effect of content popularity, number of contents and a cellular backup network on the performance of content distribution protocols in urban VANET scenarios., , , and . Comput. Commun., (2017)LWESP: Light-Weight Exterior Sensornet Protocol., , , and . ISCC, page 913-919. IEEE Computer Society, (2009)Experimental Evaluation of the ETSI DCC Adaptive Approach and Related Algorithms., , , and . CoRR, (2024)An empirical study of Cloud Gaming., , , and . NetGames, page 1-2. IEEE, (2012)