1. Khan, A.R.: Analysis the channel allocation for removing the traffic problems from the roaming systems. Int. J. Adv. Res. Eng. Appl. Sci. 3(7), 74–86 (2014)
2. Khan, A.R.: Possible solution for traffic in roaming system. Int. J. Adv. Res. Eng. Appl. Sci. 3(8), 1–15 (2014)
3. Shamir, A.: Identity based cryptosystems and signature schemes, Crypto’84, LNCS 196, pp. 47–53. Springer-Verlag, Santa Barbara, USA (1984)
4. Al-Riyami, S., Paterson, K.: Certificateless public key cryptography, Asiacrypt’ 03, LNCS 2894, pp. 452–473. Springer-Verlag (2003)
5. Sharma, G., Bala, S., Verma, A. K.: On the security of certificateless signature schemes. Int. J. Distrib. Sens. Netw. 2013, Article ID 102508, 6 p. (2013) Hindawi. doi:
10.1155/2013/102508