Author of the publication

Performance Evaluation of IPv4 and IPv6 on Windows Vista and Linux Ubuntu

, , and . Networks Security, Wireless Communications and Trusted Computing, International Conference on, (2009)
DOI: 10.1109/NSWCTC.2009.368,

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A visual attention model based on wavelet transform and its application on ship detection., , and . IGARSS, page 2202-2205. IEEE, (2012)Conditional privacy-preserving authentication scheme for V2V communication without pseudonyms., , , , and . J. Inf. Secur. Appl., (November 2023)A pixel-based digital photo authentication framework via demosaicking inter-pixel correlation., , and . MM&Sec, page 125-130. ACM, (2009)On trust models for communication security in vehicular ad-hoc networks., and . Ad Hoc Networks, (2019)Learning images using compositional pattern-producing neural networks for source camera identification and digital demographic diagnosis., , and . Pattern Recognit. Lett., 33 (4): 381-396 (2012)Robust Symbolic Dual-View Facial Expression Recognition With Skin Wrinkles: Local Versus Global Approach., , and . IEEE Trans. Multim., 12 (6): 536-543 (2010)Interaction of Asn297-Linked Glycan Ligands with the Fc Fragment of the Immunoglobulin Class G1: A Molecular Dynamics Simulation Study., , , , , , , , , and 2 other author(s). J. Chem. Inf. Model., 64 (3): 785-798 (2024)Inter-Frame Information Transfer Via Projection Onto Convex Set for Video Deblurring., and . IEEE J. Sel. Top. Signal Process., 5 (2): 275-284 (2011)Security Analysis of Efficient Anonymous Authentication With Conditional Privacy Preserving Scheme for Vehicular Ad Hoc Networks., , , and . IACR Cryptol. ePrint Arch., (2019)On a Blockchain-Based Security Scheme for Defense against Malicious Nodes in Vehicular Ad-Hoc Networks., , , and . Sensors, 22 (14): 5361 (2022)