Author of the publication

Improved Authentication Scheme of Binding Update Protocol in Mobile IPv6 Networks.

, and . ICITCS, page 1-4. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Routing Information System and HOIDS for Detection Method of Vicious Attack in Large Networks., , , and . ISPA Workshops, volume 4331 of Lecture Notes in Computer Science, page 917-926. Springer, (2006)Resource Reservation and Allocation Based on Direction Prediction for Handoff in Mobile Multimedia Networks., , and . International Conference on Computational Science, volume 2660 of Lecture Notes in Computer Science, page 555-565. Springer, (2003)Improved Structure Management of Gateway Firewall Systems for Effective Networks Security., , and . ISCIS, volume 2869 of Lecture Notes in Computer Science, page 1076-1083. Springer, (2003)HOIDS-Based Detection Method of Vicious Event in Large Networks., , and . EUC Workshops, volume 4097 of Lecture Notes in Computer Science, page 998-1005. Springer, (2006)Location and Direction Estimation-Based Resource Reservation Scheme for the Handoff in Micro Cellular Multimedia Networks., , and . Wireless Personal Communications, 94 (2): 187-208 (2017)Multi-level Protection Building for Virus Protection Infrastructure., , and . International Conference on Computational Science, volume 3036 of Lecture Notes in Computer Science, page 631-634. Springer, (2004)Recent trends on mobile computing and future networks., , and . Personal and Ubiquitous Computing, 18 (3): 489-491 (2014)Performance Improvement Scheme of NIDS through Optimizing Intrusion Pattern Database., , , and . ISCIS, volume 2869 of Lecture Notes in Computer Science, page 1098-1105. Springer, (2003)Efficient Migration Algorithm for Mobile Agents in Wired/Wireless Internets., , and . International Conference on Computational Science, volume 2660 of Lecture Notes in Computer Science, page 626-636. Springer, (2003)A feature selection approach to find optimal feature subsets for the network intrusion detection system., and . Clust. Comput., 19 (1): 325-333 (2016)