Author of the publication

Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications.

, , , , , and . ACISP, volume 2727 of Lecture Notes in Computer Science, page 180-191. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of Policy-Based Security Management for Intrusion Detection., , and . Security and Management, page 337-340. CSREA Press, (2003)A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation., , and . ICISC, volume 2288 of Lecture Notes in Computer Science, page 146-159. Springer, (2001)An automatic security test engine for IPv6 network., , , and . Int. J. Wirel. Mob. Comput., 1 (1): 61-69 (2005)Web-based Security Management System for IPsec., , and . IMSA, page 71-75. IASTED/ACTA Press, (2001)Context-Based Proofreading of Structured Documents., , , , , , and . ICCSA (4), volume 3046 of Lecture Notes in Computer Science, page 743-753. Springer, (2004)Shortest-Path Mailing Service Using Active Technology., , and . ICOIN, volume 2662 of Lecture Notes in Computer Science, page 336-345. Springer, (2003)Context-based free-form annotation in XML documents, , , , and . Int. J. Hum.-Comput. Stud., 59 (3): 257--285 (September 2003)Annotation Repositioning Methods in the XML Documents: Context-Based Approach., , , , and . ICCSA (4), volume 3046 of Lecture Notes in Computer Science, page 772-782. Springer, (2004)Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications., , , , , and . ACISP, volume 2727 of Lecture Notes in Computer Science, page 180-191. Springer, (2003)C-ISCAP: Controlled-Internet Secury Connectivity Assurance Platform., , , and . ICEIS (2), page 920-925. (2001)