|
Search the dblp DataBase
Mortaza S. Bargh:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Mortaza S. Bargh, Arjan J. H. Peddemors
Towards an Energy-Aware Network Activation Strategy for Multi-Homed Mobile Devices. [Citation Graph (0, 0)][DBLP] PSC, 2006, pp:3-9 [Conf]
- Dirk-Jaap Plas, Mortaza S. Bargh, Jan Laarhuis, Jeroen van Vugt, Jacco Brok, Herma Van Kranenburg
The 4GPLUS Project, Overview and Main Results. [Citation Graph (0, 0)][DBLP] ECUMN, 2004, pp:1-11 [Conf]
- Bob Hulsebosch, Alfons H. Salden, Mortaza S. Bargh
Context-Based Service Access for Train Travelers. [Citation Graph (0, 0)][DBLP] EUSAI, 2004, pp:84-87 [Conf]
- Mortaza S. Bargh, Hans Zandbelt, Arjan J. H. Peddemors
Managing Mobility in Beyond-3G Environments. [Citation Graph (0, 0)][DBLP] HSNMC, 2004, pp:545-555 [Conf]
- Arjan J. H. Peddemors, Hans Zandbelt, Mortaza S. Bargh
A Mechanism for Host Mobility Management supporting Application Awareness. [Citation Graph (0, 0)][DBLP] MobiSys, 2004, pp:- [Conf]
- R. J. Hulsebosch, Alfons H. Salden, Mortaza S. Bargh, P. W. G. Ebben, J. Reitsma
Context sensitive access control. [Citation Graph (0, 0)][DBLP] SACMAT, 2005, pp:111-119 [Conf]
- Ronald van Eijk, Mortaza S. Bargh, Alfons H. Salden, Peter Ebben
Privacy Enforcement Embedded in Mobile Services. [Citation Graph (0, 0)][DBLP] Wireless Information Systems, 2004, pp:42-49 [Conf]
- Mortaza S. Bargh, R. J. Hulsebosch, Henk Eertink, Anand R. Prasad, Hu Wang, Peter Schoo
Fast authentication methods for handovers between IEEE 802.11 wireless LANs. [Citation Graph (0, 0)][DBLP] WMASH, 2004, pp:51-60 [Conf]
- R. J. Hulsebosch, Mortaza S. Bargh, P. H. Fennema, J. F. Zandbelt, M. Snijders, E. H. Eertink
Using Identity Management and Secure DNS for Effective and Trusted User Controlled Light-Path Establishment. [Citation Graph (0, 0)][DBLP] ICNS, 2006, pp:79- [Conf]
- R. J. Hulsebosch, Mortaza S. Bargh, Gabriele Lenzini, P. W. G. Ebben, Sorin M. Iacob
Context Sensitive Adaptive Authentication. [Citation Graph (0, 0)][DBLP] EuroSSC, 2007, pp:93-109 [Conf]
- R. J. Hulsebosch, Mortaza S. Bargh, J. H. van der Spek, P. H. Fennema, J. F. Zandbelt
Identity and Trust Management Directions for User Controlled Light-Path Establishment. [Citation Graph (0, 0)][DBLP] SOAS, 2005, pp:356-364 [Conf]
- Arjan J. H. Peddemors, Henk Eertink, Mortaza S. Bargh, Ignas G. Niemegeers
Network Resource Awareness and Control in Mobile Applications. [Citation Graph (0, 0)][DBLP] IEEE Internet Computing, 2007, v:11, n:2, pp:34-43 [Journal]
Indoor localization based on response rate of bluetooth inquiries. [Citation Graph (, )][DBLP]
Reducing handover latency in future IP-based wireless networks: proxy mobile IPv6 with simultaneous bindings. [Citation Graph (, )][DBLP]
Trusted Directory Services for Secure Internet Connectivity: Transport Layer Security using DNSSEC. [Citation Graph (, )][DBLP]
Trust-enhanced Security in Location-based Adaptive Authentication. [Citation Graph (, )][DBLP]
Search in 0.010secs, Finished in 0.010secs
|