Author of the publication

A Secure DSDV Routing Protocol for Ad Hoc Mobile Networks.

, , and . NCM, page 2079-2084. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hierarchical Virtual Role Assignment for Negotiation-Based RBAC Scheme.. BWCCA, page 538-543. IEEE Computer Society, (2015)An adaptive capacity enhancement strategy for sector-based cellular systems., , , , and . Computers & Mathematics with Applications, 64 (5): 1462-1472 (2012)A Secure Destination-Sequenced Distance-Vector Routing Protocol for Ad Hoc Networks., , and . JNW, 5 (8): 942-948 (2010)Design Monitoring Systems for Multi-channel Technology in Wireless Sensor Networks., , , , and . NBiS, page 586-590. IEEE Computer Society, (2015)Performance of Adaptive Vertical Handoff in Heterogeneous Networks of WLAN and WCDMA Systems., , , and . NCM, page 2103-2107. IEEE Computer Society, (2009)Temporal and Location-Based RBAC Model., , , and . NCM, page 2111-2116. IEEE Computer Society, (2009)A mobile location-based with time-constraint RBAC associated database management model., , , , and . Comput. Syst. Sci. Eng., (2012)Toward the fault identification method for diagnosing strongly t-diagnosable systems under the PMC model., and . IJCNDS, 15 (4): 386-399 (2015)A Patient-Driven Mobile Medical Information System Applying to Physician Clinical Care., , , and . IMIS, page 394-398. IEEE, (2015)Three-Party Authenticated Quantum Key Distribution Protocol with Time Constraint., , and . IMIS, page 506-511. IEEE Computer Society, (2012)