메뉴 건너뛰기




Volumn 3, Issue , 2004, Pages 1548-1552

A cost-aware control scheme for efficient authentication in wireless networks

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; MOBILE USERS; SECURITY ASSOCIATION (SA); WIRELESS NETWORKS;

EID: 11244337790     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (2)

References (12)
  • 3
    • 0042095218 scopus 로고    scopus 로고
    • Mobile IPv4 challenge/response extensions
    • November
    • C. Perkins and P. Calhoun, "Mobile IPv4 Challenge/Response Extensions," RFC3012, November 2000.
    • (2000) RFC3012
    • Perkins, C.1    Calhoun, P.2
  • 4
    • 84860065979 scopus 로고    scopus 로고
    • IEEE 802.11 Working Group
    • IEEE 802.11 Working Group, http://grouper.ieee.org/groups/802/11/ index.html.
  • 5
    • 6344252245 scopus 로고    scopus 로고
    • Proxy chaining and policy implementation in roaming
    • June
    • B. Aboba and J. Vollbrecht, "Proxy Chaining and Policy Implementation in Roaming," RFC2607, June 1999.
    • (1999) RFC2607
    • Aboba, B.1    Vollbrecht, J.2
  • 6
    • 0003329392 scopus 로고    scopus 로고
    • Mobile IP authentication, authorization and accounting requirements
    • October
    • S. Glass, T. Hiller, S. Jacobs, and C. Perkins, "Mobile IP Authentication, Authorization and Accounting Requirements," RFC2977, October 2000.
    • (2000) RFC2977
    • Glass, S.1    Hiller, T.2    Jacobs, S.3    Perkins, C.4
  • 8
    • 11244258148 scopus 로고    scopus 로고
    • The TLS protocol
    • January
    • T. Dierks and C. Allen, "The TLS Protocol," rfc2246, January 1999.
    • (1999) Rfc2246
    • Dierks, T.1    Allen, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.