-
1
-
-
0035416626
-
Enhancing IP service provision over heterogeneous wireless networks
-
August
-
L. Becchetti and P. Mahonen and L. Munoz "Enhancing IP service Provision over Heterogeneous Wireless Networks," in IEEE Communications Magazine, pp. 74-81, August 2002.
-
(2002)
IEEE Communications Magazine
, pp. 74-81
-
-
Becchetti, L.1
Mahonen, P.2
Munoz, L.3
-
3
-
-
0036471916
-
An efficient fault tolerance protocol with backup foreign agents in a hierarchical local registration mobile IP
-
Feb.
-
C. S. Hong, K. W. Yim, D. Y. Lee and D. S. Yun "An Efficient Fault tolerance Protocol with Backup Foreign Agents in a Hierarchical local Registration Mobile IP," in ETRI Journal, Vol. 24, No. 1, Feb. 2002.
-
(2002)
ETRI Journal
, vol.24
, Issue.1
-
-
Hong, C.S.1
Yim, K.W.2
Lee, D.Y.3
Yun, D.S.4
-
5
-
-
0033363733
-
Mobile IP regsitration protocols: A security attack and new secure minimal public-key based authentication
-
June
-
Sufatrio, K. Y. Lam "Mobile IP Regsitration Protocols:A Security Attack and New Secure Minimal Public-Key Based Authentication," in I-SPAN '99, June 1999.
-
(1999)
I-SPAN '99
-
-
Sufatrio, K.Y.L.1
-
8
-
-
85020598353
-
Identity-base cryptosystems and siganture schemes
-
Proc. of Crypto '84, Springer-Verlag
-
A. Shamir "Identity-base cryptosystems and siganture schemes," in Proc. of Crypto '84, LNCS, vol. 196, pp. 47-53, Springer-Verlag 1985.
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
9
-
-
0024135240
-
Zero-knowledge proofs of identity
-
U. Feige, A. Fiat and A. Shamir"Zero-knowledge proofs of identity," in J. Cryptology, vol. 1, pp. 77-94 1988.
-
(1988)
J. Cryptology
, vol.1
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
10
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and siganture problems
-
A. Fiat and A. Shamir "How to prove yourself: Practical solutions to identification and siganture problems," in Proc. Crypto '86, pp. 186-194 1986.
-
(1986)
Proc. Crypto '86
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
11
-
-
84874324906
-
Identity based encryption from the weil pairings
-
Proc. of Crypto 2001, Springer-Verlag
-
D. Boneh and M. Franklin "Identity Based Encryption from the Weil Pairings," in Proc. of Crypto 2001, LNCS vol. 2139, pp. 213-229, Springer-Verlag 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
12
-
-
33846938928
-
An identity-based signature from gap diffie-hellman groups
-
J. C. Cha and J. H. Cheon "An Identity-Based Signature from Gap Diffie-Hellman Groups," in Cryptology ePrint Archive, http://eprint.iacr.org/2002/018/2002.
-
Cryptology ePrint Archive
-
-
Cha, J.C.1
Cheon, J.H.2
-
14
-
-
0003312487
-
Remote authentication dial in user service (RADIUS)
-
Apr.
-
C. Rigney et al. "Remote Authentication Dial In User Service (RADIUS)," in IETF RFC 2138, Apr. 1997.
-
(1997)
IETF RFC
, vol.2138
-
-
Rigney, C.1
-
17
-
-
0004909437
-
AAA protocols, authentication, authorization, and accounting for the internet
-
M. Christopher "AAA Protocols, Authentication, Authorization, and Accounting for the Internet," in IEEE Internet Computing November-December 1999.
-
(1999)
IEEE Internet Computing November-december
-
-
Christopher, M.1
-
18
-
-
0003381509
-
Cdma2000 wireless data requirements for AAA
-
June
-
T. Hiller et al. "Cdma2000 wireless Data Requirements for AAA, " in RFC 3141, June 2001.
-
(2001)
RFC
, vol.3141
-
-
Hiller, T.1
-
19
-
-
0042660301
-
IETF mobile IP working group.: Mobile IP authentication. authorization, and accounting requirements
-
S. Glass, T. Hiller, S. Jacobs, C. Perkins "IETF Mobile IP Working Group.: Mobile IP Authentication. Authorization, and Accounting Requirements," in RFC 2977
-
RFC
, vol.2977
-
-
Glass, S.1
Hiller, T.2
Jacobs, S.3
Perkins, C.4
-
20
-
-
0029323309
-
Improving the performance of reliable transport protocols in mobile computing environments
-
June
-
R. Caceres and L.Iftode, "Improving the Performance of Reliable Transport Protocols in Mobile Computing Environments," in IEEE JSAC, vol. 13, no. 5, 850-57 June 1995.
-
(1995)
IEEE JSAC
, vol.13
, Issue.5
, pp. 850-857
-
-
Caceres, R.1
Iftode, L.2
|