Author of the publication

Distance Bounding Protocol for Mutual Authentication.

, , , and . IEEE Trans. Wireless Communications, 10 (2): 592-601 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Design of a Testable Parallel Multiplier.. IEEE Trans. Computers, 39 (3): 411-416 (1990)On-line scheduling of scalable real-time tasks on multiprocessor systems., , and . J. Parallel Distrib. Comput., 63 (12): 1315-1324 (2003)Dynamic Load Distribution on Meshes with Broadcasting., , and . International Journal of High Speed Computing, 9 (4): 337-357 (1997)Dynamic Two-Tier Cell Structure for Bandwidth Reservation of Handoffs in Cellular Networks., , , and . IEICE Transactions, 91-A (10): 3003-3005 (2008)Secure checkpointing., , , and . Journal of Systems Architecture, 48 (8-10): 237-254 (2003)Design and Analysis of the Dual-Torus Network., , , and . New Generation Comput., 17 (3): 229-254 (1999)Best-Effort Scheduling (m, k)-Firm Real-Time Tasks Based on the (m, k)-Firm Constraint Meeting Probability., , and . ESA/VLSI, page 240-248. CSREA Press, (2004)Annulling SYN Flooding Attacks with Whitelist., , , and . AINA Workshops, page 371-376. IEEE Computer Society, (2008)Probabilistic Checkpointing., , , and . FTCS, page 48-57. IEEE Computer Society, (1997)Security Condition for Exact Localization in Wireless Ad Hoc Networks., , , , and . IEICE Transactions, 95-B (7): 2459-2462 (2012)