Author of the publication

An efficient password authenticated key exchange protocol for WLAN and WiMAX.

, , and . ICWET, page 881-885. ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coarsening, clumping and cuspy correlations in active nematics: microscopic and coarse-grained approaches, , , , and . Abstract Book of the XXIII IUPAP International Conference on Statistical Physics, Genova, Italy, (9-13 July 2007)Fuzzy Controlled Harmonic Suppressor and Reactive Volt Ampere Compensator for Enhancing Power Quality., , and . NaBIC, page 49-54. IEEE, (2009)A fast valley-based segmentation for detection of slowly moving objects., , and . Signal Image Video Process., 12 (7): 1265-1272 (2018)An efficient password authenticated key exchange protocol for WLAN and WiMAX., , and . ICWET, page 881-885. ACM, (2011)Heirarchy of Communities in Dynamic Social Network., and . SocProS, volume 236 of Advances in Intelligent Systems and Computing, page 795-800. Springer, (2012)On the Hardness of Approximating Minimum Monopoly Problems., , and . FSTTCS, volume 2556 of Lecture Notes in Computer Science, page 277-288. Springer, (2002)Control of single-phase grid connected PV power plant for real as well as reactive power feeding., , and . CCA, page 667-672. IEEE, (2013)Origin of the 30 t transition in CeRhIn$_5$ in tilted magnetic fields, , , , , , , , , and 2 other author(s). Phys. Rev. B, 103 (16): 165124 (Apr 20, 2021)Anomalous quantum oscillations of CeCoIn$_5$ in high magnetic fields, , , , , , , , , and . Phys. Rev. B, 104 (23): 235155 (Dec 28, 2021)Implementation of new evolutionary techniques for transmission loss reduction., , , and . IEEE Congress on Evolutionary Computation, page 2331-2336. IEEE, (2007)