[PDF][PDF] Biometric Entity Based Mutual Authentication Technique for 3-G Mobile Communications

PK Bhattacharjee, C Koner, CT Bhunia… - International Journal of …, 2010 - researchgate.net
Authentication of mobile subscribers and network is a challenging issue to the researchers,
since hacking and threats are increasing with the enhanced population of wireless traffic …

[PDF][PDF] Artificial intelligence based authentication technique with three attributes in vehicular ad hoc network

PK Bhattacharjee - International Journal of Computer Theory and …, 2010 - researchgate.net
Vehicular Ad Hoc Network (VANET) is one of the wireless ad hoc networks which are based
on IEEE 802.11 wireless standard enabling vehicle to vehicle and vehicle to roadside …

[PDF][PDF] Artificial Intelligence Based Mutual Authentication Technique with Biometric Entities in 3-G Mobile Communications

PK Bhattacharjee, C Koner, CT Bhunia… - International Journal of …, 2010 - researchgate.net
An artificial intelligence based mutual authentication system with four entities is developed
keeping any eye to enhancing threat and hacking in mobile network. Since voice frequency …

[PDF][PDF] Artificial Intelligence Based Authentication Technique With Three Entities In 3-G Mobile Communications

PK Bhattacharjee, C Koner, CT Bhunia… - International Journal of …, 2010 - ijcee.org
Voice frequency pattern is asymmetric just like nature. Although voice frequency lies
between 0~ 3.5 KHz, a person talking some specific word in different times is always …

[PDF][PDF] Artificial Intelligence Based Mutual Authentication Technique With Four Entities In 4-G Mobile Communications

PK Bhattacharjee - International Journal Recent Trends in Engineering, 2010 - Citeseer
4-G mobile communications system has utilized high speed data communications
technology having connectivity to all sorts of networks including 2-G and 3-G mobile …

[PDF][PDF] A four entities mutual authentication technique for vehicular ad hoc network

PK Bhattacharjee - International Journal of Computer and Electrical …, 2010 - ijcee.org
Hacking and threats are increasing with the enhanced population of wireless traffic.
Authentication of correct mobile nodes in Vehicular Ad Hoc Network is an extremely …

[PDF][PDF] Mutual Authentication Tracking Loop Technique for 3-G Mobile Communications

PK Bhattacharjee - International Journal of Computer Theory and …, 2010 - researchgate.net
Authentication of mobile subscribers and network is an important criterion to the
researchers. Now mobile communication system (3-G or advanced) has been developed to …

[PDF][PDF] A Novel Artificial Intelligent Based Message Authentication Technique in Mobile Communications

C Koner, PK Bhattacharjee, CT Bhunia… - International Journal of …, 2010 - ijcee.org
Authentication of mobile subscriber's messages is a challenging issue for future researchers
due to increasing security threats and attacks. Next generation mobile communication …