From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Design and Implementation of a Simulation Environment for the Evaluation of Authentication Protocols in IEEE 802.11s Networks., , и . MOBILIGHT, том 81 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 206-218. Springer, (2011)A Q-learning-based Scheduler Technique for LTE and LTE-Advanced Network., , и . WINSYS, стр. 27-35. SciTePress, (2017)A MIH-based Framework for Network Selection in Future HetNets., , , и . WINSYS, стр. 67-74. SciTePress, (2017)Improved Mutual Authentication in VANETs., , , и . Ad Hoc Sens. Wirel. Networks, 42 (1-2): 63-85 (2018)An enhanced radio resource management based MIH policies in heterogeneous wireless networks., , и . Telecommun. Syst., 67 (4): 577-592 (2018)Interference-limited radio resources allocation in LTE_A system with MIH cooperation., , и . APCC, стр. 174-179. IEEE, (2016)Location Management in Wireless Fourth Generation Networks., , и . GLOBECOM, стр. 4984-4988. IEEE, (2007)A Secure Efficient and Lightweight authentication protocol for 5G cellular networks: SEL-AKA., , и . IWCMC, стр. 1311-1316. IEEE, (2019)Securing Fast PMIPv6 protocol in case of Vertical HandOver in 5G network., , и . IWCMC, стр. 1037-1042. IEEE, (2019)A Model of Role-Risk Based Intrusion Prevention for Cloud Environment., , и . IWCMC, стр. 530-535. IEEE, (2018)