Author of the publication

A secure and efficient SIP authentication scheme for converged VoIP networks.

, , , , , and . Computer Communications, 33 (14): 1674-1681 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Editorial for WICON 2010 on "Recent advances in wireless internet"., , , and . MONET, 16 (6): 745-747 (2011)Secure cell relay routing protocol for sensor networks., , , and . Wireless Communications and Mobile Computing, (2006)M2M Communications in 3GPP LTE/LTE-A Networks: Architectures, Service Requirements, Challenges, and Applications., and . IEEE Communications Surveys and Tutorials, 17 (2): 525-549 (2015)A stochastic biometric authentication scheme using uniformed GMM in wireless body area sensor networks., , , , , and . PIMRC, page 1620-1624. IEEE, (2010)Second-Order Rate-Control Based Transport Protocols Over Mobile Wireless Networks., , and . WCNC, page 3719-3724. IEEE, (2007)SHORT: Shortest Hop Routing Tree for Wireless Sensor Networks., , and . ICC, page 3450-3454. IEEE, (2006)Utilizing acoustic propagation delay to design MAC protocols for underwater wireless sensor networks., , , and . Wireless Communications and Mobile Computing, 8 (8): 1035-1044 (2008)A Subcarriers Allocation Scheme for Cognitive Radio Systems Based on Multi-Carrier Modulation., , , and . IEEE Trans. Wireless Communications, 7 (9): 3335-3340 (2008)Channel Modeling and Inter-Carrier Interference Analysis for V2V Communication Systems in Frequency-Dispersive Channels., , , and . MONET, 15 (1): 4-12 (2010)Energy-Spectrum Efficiency Tradeoff for Video Streaming over Mobile Ad Hoc Networks., , , and . IEEE Journal on Selected Areas in Communications, 31 (5): 981-991 (2013)