Author of the publication

Adaptive authentication scheme for mobile devices in proxy MIPv6 networks.

, , , , and . IET Commun., 10 (17): 2319-2327 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MIST 2016: 8th International Workshop on Managing Insider Security Threats., and . ACM Conference on Computer and Communications Security, page 1890-1891. ACM, (2016)Next generation mobility management., , , and . Wirel. Commun. Mob. Comput., 11 (4): 443-445 (2011)Efficient Computation Offloading in Edge Computing Enabled Smart Home., , , and . IEEE Access, (2021)Computational Offloading for Efficient Trust Management in Pervasive Online Social Networks Using Osmotic Computing., , , and . IEEE Access, (2017)Identifying Windows Installer Package Files for Detection of Pirated Software., , , , , and . IMIS, page 287-290. IEEE Computer Society, (2014)Extension of MIH for FPMIPv6 (EMIH-FPMIPv6) to support optimized heterogeneous handover., , , , and . Future Gener. Comput. Syst., (2019)Ultra-Reliable Communications for Industrial Internet of Things: Design Considerations and Channel Modeling., , , , , , , , and . IEEE Netw., 33 (4): 104-111 (2019)Balanced bipartite graph based register allocation for network processors in mobile and wireless networks., , , , and . Mob. Inf. Syst., 6 (1): 65-83 (2010)Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process., , and . Mob. Inf. Syst., (2020)Analyzing RRC Replay Attack and Securing Base Station with Practical Method., , , and . ARES, page 62:1-62:8. ACM, (2022)