Search

Your search keyword '"Mahdi Aiash"' showing total 97 results

Search Constraints

Start Over You searched for: Author "Mahdi Aiash" Remove constraint Author: "Mahdi Aiash"
97 results on '"Mahdi Aiash"'

Search Results

1. An Introduction of a Modular Framework for Securing 5G Networks and Beyond

2. Formalization and evaluation of EAP-AKA’ protocol for 5G network access security

3. IoT-Based Emergency Vehicle Services in Intelligent Transportation System

4. Investigating a Mobility-Aware QoS Model for Multimedia Streaming Rate Adaptation

5. A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology

40. DCSS Protocol for Data Caching and Sharing Security in a 5G Network

41. Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems

42. Formal verification of authentication and service authorization protocols in 5G-enabled device-to-device communications using ProVerif

44. Security in Network Services Delivery for 5G Enabled D2D Communications: Challenges and Solutions

45. Formal verification and analysis of primary authentication based on 5G-AKA protocol

46. The Case for Federated Identity Management in 5G Communications

47. Investigating network services abstraction in 5G enabled device-to-device (D2D) communications

48. Formalization and Analysis of a Resource Allocation Security Protocol for Secure Service Migration

50. Mobile femtocell utilisation in LTE vehicular environment: vehicular penetration loss elimination and performance enhancement

Catalog

Books, media, physical & digital resources