Author of the publication

Performance Analysis of IEEE 802.16e Handover with RSA-Based Authentication.

, , and . ICC, page 1-5. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing wireless communications in transmit-beamforming systems by precoding jamming noise signals., , , and . Secur. Commun. Networks, 5 (9): 1028-1036 (2012)Editorial., , and . Secur. Commun. Networks, 1 (1): 1-3 (2008)Leveraging Statistical Feature Points for Generalized Detection of Covert Timing Channels., , , and . MILCOM, page 7-11. IEEE, (2014)An energy-balanced distributed clustering protocol for wireless sensor networks., , , and . CSNDSP, page 861-864. IEEE, (2014)Towards a unified model for the analysis of timing-based covert channels., , and . ICC, page 816-820. IEEE, (2014)Achieving robustness and capacity gains in covert timing channels., , , and . ICC, page 969-974. IEEE, (2014)Distributed beamforming with imperfect phase synchronization for cognitive radio networks., , , and . ICC, page 4936-4940. IEEE, (2013)Impact of channel estimation errors on effectiveness of Eigenvector-based jamming for physical layer security in wireless networks., , , , and . CAMAD, page 122-126. IEEE, (2011)Throughput vs. Distance Tradeoffs and Deployment Considerations for a Multi-Hop IEEE 802.16e Railroad Test Bed., , , , and . VTC Spring, page 2596-2600. IEEE, (2008)A study on energy efficient multi-tier multi-hop wireless sensor networks for freight-train monitoring., , , , , and . IWCMC, page 297-301. IEEE, (2011)