Author of the publication

Enhancing Security of LTE using a Double Masking Technique.

, , and . BWCCA, volume 2 of Lecture Notes on Data Engineering and Communications Technologies, page 747-754. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments., , , , , and . IEEE Access, (2018)Designing A Healthcare Authorization Model Based On Cloud Authentication., , , and . Intell. Autom. Soft Comput., 20 (3): 365-379 (2014)A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS by Using a Data Connection Core., , , , and . BWCCA, page 360-365. IEEE, (2013)The simulation of an emotional robot implemented with fuzzy logic., , , and . Soft Comput., 18 (9): 1729-1743 (2014)A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks., , and . ARES, volume 6908 of Lecture Notes in Computer Science, page 255-270. Springer, (2011)High-Efficient Multi-key Exchange Protocol Based on Three-Party Authentication., , , , and . IMIS, page 487-492. IEEE Computer Society, (2014)Generating Dynamic Box by Using an Input String., , , , and . MobiSec, volume 971 of Communications in Computer and Information Science, page 17-29. Springer, (2017)A Handover Scheme for LTE Wireless Networks under the Assistance of GPS., , , , and . BWCCA, page 399-403. IEEE, (2013)The IPSec Security Problems and a Cross-layer Security Mechanism for PMIPv6 Handover when an IPSec Security Association is Established on an L2 Direct Link., , and . BWCCA, page 452-457. IEEE, (2012)A Group File Encryption Method using Dynamic System Environment Key., , , and . NBiS, page 476-483. IEEE Computer Society, (2014)