Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Iterative CZT-based frequency offset estimation for frequency-selective channels., , , and . ICC, page 2157-2161. IEEE, (2005)A Network Traffic Simulator to Reflect User's Behaviors., , and . Communications in Computing, page 217-221. CSREA Press, (2005)Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs)., , , , , , and . ACM Southeast Regional Conference (2), page 75-80. ACM, (2005)1-59593-059-0.Research on unequal error protection with punctured convolutional codes in image transmission system over mobile channels., , , and . WCNC, page 1253-1257. IEEE, (2000)A behavior analysis based Mobile Malware Defense System., , and . ICSPCS, page 1-6. IEEE, (2012)Separable and Anonymous Identity-Based Key Issuing., , , , , , , , and . ICPADS (2), page 275-279. IEEE Computer Society, (2005)Performance of the interleaved (2, 1, 7) convolutional codes in mobile image communication system., , , and . WCNC, page 634-637. IEEE, (2000)An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks., , , , , and . ICC, page 1241-1246. IEEE, (2007)An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication., , , , , , , and . WCNC, page 2088-2093. IEEE, (2005)Behavior Classification based Self-learning Mobile Malware Detection., , , , , and . JCP, 9 (4): 851-858 (2014)