Author of the publication

An efficient uplink admission control for ertPS in IEEE 802.16.

, , and . ICOIN, page 395-400. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unified security architecture and protocols using third party identity in V2V and V2I networks., and . Wireless Communications and Mobile Computing, 12 (15): 1326-1337 (2012)Threat Analysis on NEtwork MObility (NEMO)., , , and . ICICS, volume 3269 of Lecture Notes in Computer Science, page 331-342. Springer, (2004)A Mobile Device-Based Mobile AP Detection Scheme Using NAT Behavior., , , and . ICITCS, page 1-4. IEEE Computer Society, (2013)A Distributed Self-Organizing Map for DoS attack detection., , and . ICUFN, page 19-22. IEEE, (2015)Dynamic analysis with Android container: Challenges and opportunities., and . Digital Investigation, (2018)Time-domain approach using multiple Kalman filters and EM algorithm to speech enhancement with nonstationary noise., and . IEEE Trans. Speech and Audio Processing, 8 (3): 282-291 (2000)Centralized management solution for vagrant in development environment., , and . IMCOM, page 37. ACM, (2017)A Study of OAuth 2.0 Risk Notification and Token Revocation from Resource Server., , , and . WISA, volume 9503 of Lecture Notes in Computer Science, page 281-287. Springer, (2015)Integrated Authentication Model for Network Access in Next Generation Networks., , , and . IEICE Transactions, 90-B (11): 3246-3249 (2007)Secure Password Authentication for Distributed Computing., and . CIS, volume 4456 of Lecture Notes in Computer Science, page 491-501. Springer, (2006)