Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IceClave: A Trusted Execution Environment for In-Storage Computing., , , , , , , , , and . MICRO, page 199-211. ACM, (2021)An Analysis of Policy Provisioning Complexity in Accordance with the Application Attributes of the Policy-Based Network., , , and . ICCSA (5), volume 3984 of Lecture Notes in Computer Science, page 626-634. Springer, (2006)An Evaluation and Analysis for IP VPN Model in IPv6 Transition Environment., , , and . ICCSA (2), volume 3981 of Lecture Notes in Computer Science, page 135-144. Springer, (2006)Secure Communication Scheme Applying MX Resource Record in DNSSEC Domain., , , and . ICCSA (1), volume 3043 of Lecture Notes in Computer Science, page 238-245. Springer, (2004)Adaptive Bandwidth Control Using Fuzzy Inference in Policy-Based Network Management., , and . ICOIN, volume 3391 of Lecture Notes in Computer Science, page 443-451. Springer, (2005)Reducing Communication Overhead for Nested NEMO Networks: Roaming Authentication and Access Control Structure., , , , and . IEEE Trans. Vehicular Technology, 60 (7): 3408-3423 (2011)An Analysis and Evaluation of Policy-Based Network Management Approaches., , , and . ICCNMC, volume 3619 of Lecture Notes in Computer Science, page 590-599. Springer, (2005)Preventing Out-of-Sequence Packets on the Route Optimization Procedure in Proxy Mobile IPv6., , and . AINA, page 950-954. IEEE Computer Society, (2008)Qualitative Method-Based the Effective Risk Mitigation Method in the Risk Management., , , and . ICCSA (2), volume 3981 of Lecture Notes in Computer Science, page 239-248. Springer, (2006)Performance Evaluation of Public Key Based Mechanisms for Mobile IPv4 Authentication in AAA Environments., , and . ICOIN, volume 3961 of Lecture Notes in Computer Science, page 62-71. Springer, (2006)