Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LinkA: A Link Layer Anonymization Method Based on Bloom Filter for Authenticated IoT Devices., , and . Intelligent Automation & Soft Computing, 22 (3): 365-369 (2016)Partial Key Exposure Attacks on Unbalanced RSA with the CRT., , and . IEICE Transactions, 89-A (2): 626-629 (2006)SNC: a selective neighbor caching scheme for fast handoff in IEEE 802.11 wireless networks., , , and . Mobile Computing and Communications Review, 9 (4): 39-49 (2005)An Adaptive Network Mobility Support Protocol in Hierarchical Mobile IPv6 Networks., , , and . IEEE Trans. Vehicular Technology, 58 (7): 3627-3639 (2009)An Energy-efficient and Lightweight Indoor Localization System for Internet-of-Things (IoT) Environments., , , , and . IMWUT, 2 (1): 17:1-17:28 (2018)A Method for Hiding Link Layer Addresses Using Bloom Filter in Wireless Sensor Networks., , , , and . J. Internet Serv. Inf. Secur., 4 (4): 71-81 (2014)A network selection scheme for multicast applications in wireless network convergence., , , , and . Wireless Communications and Mobile Computing, 12 (11): 999-1012 (2012)A Distributed Node Scheduling Protocol Considering Sensing Coverage in Wireless Sensor Networks., , , and . VTC Fall, page 352-356. IEEE, (2007)Security and efficiency in authentication protocols resistant to password guessing attack., and . LCN, page 245-252. IEEE Computer Society, (1997)Quantifying the Interference Gray Zone in Wireless Networks: A Measurement Study., , , , and . ICC, page 3758-3763. IEEE, (2007)