Author of the publication

Enhancing Security of LTE using a Double Masking Technique.

, , and . BWCCA, volume 2 of Lecture Notes on Data Engineering and Communications Technologies, page 747-754. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The simulation of an emotional robot implemented with fuzzy logic., , , and . Soft Comput., 18 (9): 1729-1743 (2014)MIH-Based Congestion Control with Seamless Handover in Untrusted Networks., and . IMIS, volume 612 of Advances in Intelligent Systems and Computing, page 502-510. Springer, (2017)A Multi-layer Secure Prevention Scheme for Improving e-Commerce Security., , and . IMIS, page 505-510. IEEE Computer Society, (2014)The Study of MME Pool Management and Fault Tolerance in 5G Networks with SDN Controllers., and . IMIS, volume 773 of Advances in Intelligent Systems and Computing, page 585-595. Springer, (2018)Implementation of a virtual switch monitoring system using OpenFlow on cloud., , , , and . Int. J. Ad Hoc Ubiquitous Comput., 24 (3): 162-172 (2017)A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS by Using a Data Connection Core., , , , and . BWCCA, page 360-365. IEEE, (2013)Secure Mobile Instant Messaging key exchanging protocol with One-Time-Pad substitution transposition cryptosystem., , , , and . INFOCOM Workshops, page 980-984. IEEE, (2016)A Secure ECC-based Electronic Medical Record System., , , , , and . J. Internet Serv. Inf. Secur., 4 (1): 47-57 (2014)Fuzzy-Based Dynamic Bandwidth Allocation System., , and . FSKD (2), volume 3614 of Lecture Notes in Computer Science, page 911-920. Springer, (2005)A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks., , and . ARES, volume 6908 of Lecture Notes in Computer Science, page 255-270. Springer, (2011)