Author:
Al-Fayoumi Mustafa A.,Shilbayeh Nidal F.
Publisher
Springer Science and Business Media LLC
Subject
Strategy and Management,Computer Networks and Communications,Hardware and Architecture,Information Systems
Reference20 articles.
1. AL-Saraireh, J.: Efficient and secure authentication and key agreement protocol. J UbiComp A, Int (2011). doi: 10.5121/iju2011.2201
2. AL-Saraireh, J.: Security performance analysis and enhancement of authentication protocol in Wireless Mobile Networks. J Am Sci 7(5), 599–610 (2011)
3. Taheri, J., Zomaya, A.Y.: A simulation tool for mobility management experiments. Int J Pervasive Comput Commun A (2009). doi: 10.1108/17427370910991893
4. Kara, N.: Mobility management approaches for mobile IP networks: performance comparison and use recommendations. IEEE Trans Mobile Comput 8(10), 1312–1325 (2009). doi: 10.1109/TMC.2009.36
5. Taheri J, Zomaya AY (2008) Bio-inspired Algorithms for Mobility Management. Int. Sympos Parallel Archit Algorith Netw 216–223. doi: 10.1109/I-SPAN.2008.26
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献