Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementing RADIUS and Diameter AAA Systems in IPv6-Based Scenarios., , and . AINA, page 851-855. IEEE Computer Society, (2005)A Framework for Supporting Network Continuity in Vehicular IPv6 Communications., , , , , and . IEEE Intell. Transp. Syst. Mag., 6 (1): 17-34 (2014)Network access security for the internet: protocol for carrying authentication for network access., , , and . IEEE Commun. Mag., 50 (3): 84-92 (2012)Towards a standard SDN-based IPsec management framework., , and . Comput. Stand. Interfaces, (2019)Media-independent pre-authentication supporting secure interdomain handover optimization., , , , , , , and . IEEE Wirel. Commun., 15 (2): 55-64 (2008)Pre-Authentication Based Enhancement for Access Control in Hybrid MANETs., , , , and . ISCC, page 595-600. IEEE Computer Society, (2007)Secure three-party key distribution protocol for fast network access in EAP-based wireless networks., , , and . Comput. Networks, 54 (15): 2651-2673 (2010)Out-of-band federated authentication for Kerberos based on PANA., , , and . Comput. Commun., 36 (14): 1527-1538 (2013)Identity Federations Beyond the Web: A Survey., , , , and . IEEE Commun. Surv. Tutorials, 16 (4): 2125-2141 (2014)Network-Layer Assisted Mechanism to Optimize Authentication Delay during Handoff in 802.11 Networks., , , , and . MobiQuitous, page 1-8. IEEE Computer Society, (2007)