Author of the publication

A fingerprint-based user authentication protocol considering both the mobility and security in the telematics environment.

, , , , , , and . Comput. Stand. Interfaces, 31 (6): 1098-1107 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Call blocking and effective throughput analysis for a Mobile Multi-hop Relay uplink system., , , , , and . PIMRC, page 2288-2292. IEEE, (2010)A note on the set-theoretical defuzzification., , and . Fuzzy Sets Syst., 98 (3): 337-341 (1998)Performance of IEEE802.16 Random Access Protocol - Transient Queueing Analysis., , and . GLOBECOM, IEEE, (2006)Performance analysis of a cellular network using frequency reuse partitioning., , , and . Perform. Evaluation, 70 (2): 77-89 (2013)Performance Analysis of Two-Hop Cellular Systems in Transparent and Non-transparent Modes., , , , , and . IEICE Trans. Commun., 94-B (11): 3107-3115 (2011)Multi-Cluster based Dynamic Channel Assignment for Dense Femtocell Networks., , , , and . KSII Trans. Internet Inf. Syst., 10 (4): 1535-1554 (2016)Performance Analysis of IEEE802.16e Random Access Protocol with Mobility., , , and . Networking, volume 3976 of Lecture Notes in Computer Science, page 1106-1112. Springer, (2006)Evolving Toward Next Generation Wireless Broadband Internet., , , , and . International Conference on Computational Science (4), volume 3994 of Lecture Notes in Computer Science, page 168-171. Springer, (2006)An Adaptive Power Saving Scheme in OFDMA-TDD-Based Cellular Relay Networks., , , , , and . IEICE Trans. Commun., 93-B (6): 1657-1660 (2010)Designs of a Secure Wireless LAN Access Technique and an Intrusion Detection System for Home Network., , , , and . NCM (1), page 318-324. IEEE Computer Society, (2008)