Author of the publication

Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks.

, , and . J. Inf. Process. Syst., 7 (1): 137-150 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Model for Embedding and Authorizing Digital Signatures in Printed Documents., , , and . ICISC, volume 2587 of Lecture Notes in Computer Science, page 465-477. Springer, (2002)Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks., , and . EUC Workshops, volume 4097 of Lecture Notes in Computer Science, page 281-290. Springer, (2006)ABC2: A New Approach to Seamless Mobility Using Cellular Networks and WLANs., , and . WCNC, page 2675-2680. IEEE, (2008)A survey of traffic-based routing metrics in family of expected transmission count for self-organizing networks., , and . Comput. Electr. Eng., 40 (6): 1801-1812 (2014)Lambda GLSP setup with QoS requirements in optical Internet., , and . Comput. Commun., 26 (6): 603-610 (2003)Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce., , and . Comput. Commun., 30 (4): 893-903 (2007)An integrated admission control based on measurements in ATM networks., and . Comput. Commun., 22 (15-16): 1440-1446 (1999)TSA: Time Series Adaptation for enhanced Cell Reselection in UMTS., , and . ICT, page 340-345. IEEE, (2009)A cluster key management scheme utilizing time-based keys for wireless sensor networks., , and . IADIS AC (1), page 217-225. IADIS Press, (2009)Contention-Based Limited Deflection Routing Protocol in Optical Burst-Switched Networks., , , and . IEEE J. Sel. Areas Commun., 23 (8): 1596-1611 (2005)