Author of the publication

An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks.

, , and . Computer Communications, 34 (3): 319-325 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dominance Hierarchies Induce a Population's Full Cooperation., , , and . Dynamic Games and Applications, 4 (4): 432-447 (2014)Mixed output feedback of the finite frequency H∞ control for singularly perturbed system., , , and . Int. J. Systems Science, 46 (13): 2351-2366 (2015)Decomposing Automatic Train Control Verification System with Projection., , , , and . APSEC, page 301-308. IEEE Computer Society, (2015)Inter-cell interference statistics of uplink OFDM systems with Soft Frequency Reuse., , , , and . GLOBECOM, page 4764-4769. IEEE, (2012)Bregman-Based Inexact Excessive Gap Method for Multiservice Resource Allocation., , , and . IEEE Trans. Wireless Communications, 14 (2): 1115-1130 (2015)Online learning for unreliable passive monitoring in multi-channel wireless networks., , and . ICC, page 7257-7262. IEEE, (2015)Sniffer Channel Assignment With Imperfect Monitoring for Cognitive Radio Networks., , , , and . IEEE Trans. Wireless Communications, 15 (3): 1703-1715 (2016)A new survey adjustment method for laser tracker relocation., , , and . ROBIO, page 2383-2388. IEEE, (2015)Practical Secret Key Agreement for Full-Duplex Near Field Communications., , , , and . IEEE Trans. Mob. Comput., 15 (4): 938-951 (2016)DESKS: Direction-Aware Spatial Keyword Search., , and . ICDE, page 474-485. IEEE Computer Society, (2012)