The Concentric Clustering for Efficient Energy Consumption in PEGASIS
SNMP-based Integrated Wire/wireless Device Management System
The Dynamic Buffer Overflow Detection and Prevention Tool for Windows Executables Using Binary Rewriting
Local Authentication Scheme based on AAA in Mobile IPv6 Networks
Modeling Active Cyber Attack for Network Vulnerability Assessment (SCIE)
Session Key Forwarding Scheme based on AAA Architecture in Wireless Networks (SCIE)
The effective group key agreement protocol for ad-hoc networks for medical emergency environments
Minimal Public-Key Based Authentication Mechanism in Mobile IPv6 Networks
Performance Evaluation of Dual Authentication Scheme in Mobile IPv6 Networks
Security Analysis of Extensible Authentication Protocol Methods based on AAA Architecture
Experimental Performance Evaluation of Mobile IPv6 Handovers over Wireless LAN
Context-Role Based Access Control for Context-Aware Application (SCIE)
Performance Evaluation of Public Key based Mechanisms for Mobile IPv4 Authentication in the AAA Environments (SCIE)
Context-Role Based Access Control for Intelligent Space (SCIE)
An Evaluation and Analysis for IP VPN Model in IPv6 Transition Environment (SCIE)
An Analysis of Policy Provisioning Complexity in Accordance with the Application Attributes of the Policy-Based Network (SCIE)
Comparative Analysis of IPv6 VPN Transition in NEMO Environments (SCIE)
Qualitative Method-based The Effective Risk Mitigation Method in The Risk Management (SCIE)
A Study on Agent-based Integrated Security Management System for Managing Heterogeneous Firewall Systems (SCIE)
Enhanced SCORM Sequencing Rulefor e-Learning System (SCIE)