Author of the publication

Adaptive authentication scheme for mobile devices in proxy MIPv6 networks.

, , , , and . IET Commun., 10 (17): 2319-2327 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Technology trends of access control in IoT and requirements analysis., , , and . ICTC, page 1031-1033. IEEE, (2015)DroidVulMon - Android Based Mobile Device Vulnerability Analysis and Monitoring System., , , and . NGMAST, page 26-31. IEEE, (2013)Secure user authentication based on the trusted platform for mobile devices., , and . EURASIP J. Wireless Comm. and Networking, (2016)Implementation of LSM-Based RBAC Module for Embedded System., , , and . WISA, volume 4867 of Lecture Notes in Computer Science, page 91-101. Springer, (2007)Improving performance of X-rated video classification with the optimized repeated curve-like spectrum feature and the skip-and-analysis processing., , , , and . Multimedia Tools Appl., 71 (2): 717-740 (2014)Audio-based automatic detection of objectionable contents in noisy conditions using normalized segmental two-dimesional MFCC., , , , and . ICASSP, page 481-484. IEEE, (2012)Protection method from APP repackaging attack on mobile device with separated domain., , , and . ICTC, page 667-668. IEEE, (2014)Software-Based Instrumentation for Localization of Faults Caused by Electrostatic Discharge., , , , , and . HASE, page 333-339. IEEE Computer Society, (2011)Automatic Classification of X-rated Videos using Obscene Sound Analysis based on a Repeated Curve-like Spectrum Feature, , , and . CoRR, (2011)A study of the method of providing secure network channel among secure OSs., , and . ISICT, volume 49 of ACM International Conference Proceeding Series, page 345-350. Trinity College Dublin, (2003)