Author of the publication

Adaptive authentication scheme for mobile devices in proxy MIPv6 networks.

, , , , and . IET Commun., 10 (17): 2319-2327 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Implementation of a Gigabit Router using Network Processor., , , , and . IMSA, page 32-35. IASTED/ACTA Press, (2005)Protection method from APP repackaging attack on mobile device with separated domain., , , and . ICTC, page 667-668. IEEE, (2014)Secure mobile device structure for trust IoT., , , and . J. Supercomput., 74 (12): 6646-6664 (2018)Adaptive authentication scheme for mobile devices in proxy MIPv6 networks., , , , and . IET Commun., 10 (17): 2319-2327 (2016)A study of the method of providing secure network channel among secure OSs., , and . ISICT, volume 49 of ACM International Conference Proceeding Series, page 345-350. Trinity College Dublin, (2003)Implementation of TLS and DTLS on Zephyr OS for IoT Devices., , and . ICTC, page 1292-1294. IEEE, (2018)SecureDom: secure mobile-sensitive information protection with domain separation., , and . J. Supercomput., 72 (7): 2682-2702 (2016)Improving performance of X-rated video classification with the optimized repeated curve-like spectrum feature and the skip-and-analysis processing., , , , and . Multimedia Tools Appl., 71 (2): 717-740 (2014)The Secure Urgent Situation Propagation System using the Mobile Security Solution., , and . CSCESM, page 109-114. IEEE, (2015)Hierarchical Access Control for SDP-IoT., and . ICTC, page 1742-1744. IEEE, (2020)