Author of the publication

A secure and efficient SIP authentication scheme for converged VoIP networks.

, , , , , and . Computer Communications, 33 (14): 1674-1681 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quasi-Quadrature Modulation Method for Power-Efficient Video Transmission Over LTE Networks., , , , and . IEEE Trans. Vehicular Technology, 63 (5): 2083-2092 (2014)Hierarchical Node Clustering Approach for Energy Savings in WSNs., , , , , , , and . SERA, page 253-259. IEEE Computer Society, (2007)Cooperative Wireless Energy Harvesting and Spectrum Sharing in 5G Networks., , and . IEEE Access, (2016)Guest Editorial Special Issue on Security and Privacy in Cyber-Physical Systems., , , , , and . IEEE Internet of Things Journal, 4 (6): 1798-1801 (2017)An interactive cluster-based MDS localization scheme for multimedia information in wireless sensor networks., , and . Computer Communications, 35 (15): 1921-1929 (2012)A secure and efficient SIP authentication scheme for converged VoIP networks., , , , , and . Computer Communications, 33 (14): 1674-1681 (2010)On inter-cell interference factor in the uplinks of multicell planar networks., , , , , and . ICC, page 4669-4673. IEEE, (2014)Joint Multiple Relay Selection and Time Slot Allocation Algorithm for the EH-Abled Cognitive Multi-User Relay Networks., , , , and . IEEE Access, (2019)Policy-Based Management for Self-Managing Wireless Sensor Networks., , , , , and . IEICE Transactions, 90-B (11): 3024-3033 (2007)Classification and Experimental Analysis for Clone Detection Approaches in Wireless Sensor Networks., , , , and . IEEE Systems Journal, 7 (1): 26-35 (2013)