-
1
-
-
1342282538
-
The evolution of wireless LANs and PANs - Efficient authentication and key distribution in wireless IP networks
-
December
-
L. Salgarelli, M. Buddhikot, J. Garay, S. Patel, and S. Miller, "The Evolution of Wireless LANs and PANs - Efficient Authentication and Key Distribution in Wireless IP Networks," IEEE Personal Communications on Wireless Communications, vol. 10, pp. 52-61, December 2003.
-
(2003)
IEEE Personal Communications on Wireless Communications
, vol.10
, pp. 52-61
-
-
Salgarelli, L.1
Buddhikot, M.2
Garay, J.3
Patel, S.4
Miller, S.5
-
2
-
-
18144362603
-
Diameter base protocol
-
December
-
P. Calhoun, J. Loughney, E. Guttman, G. Zorn, and J. Arkko, "Diameter Base Protocol," draft-ietf-aaa-diameter-17.txt, December 2002.
-
(2002)
Draft-ietf-aaa-diameter-17.txt
-
-
Calhoun, P.1
Loughney, J.2
Guttman, E.3
Zorn, G.4
Arkko, J.5
-
6
-
-
0031212378
-
Adaptive algorithms for reducing PCS network authentication traffic
-
August
-
Y. Lin, S. Mohan, N. Sollenberger, and H. Sherry, "Adaptive Algorithms for Reducing PCS Network Authentication Traffic," IEEE Transactions on Vehicular Technology, vol. 46, pp. 588-596, August 1997.
-
(1997)
IEEE Transactions on Vehicular Technology
, vol.46
, pp. 588-596
-
-
Lin, Y.1
Mohan, S.2
Sollenberger, N.3
Sherry, H.4
-
7
-
-
0031257939
-
An authentication technique based on distributed security management for the global mobility network
-
October
-
S. Suzuki and K. Nakada, "An Authentication Technique based on Distributed Security Management for the Global Mobility Network," IEEE JSAC, vol. 15, pp. 1608-1617, October 1997.
-
(1997)
IEEE JSAC
, vol.15
, pp. 1608-1617
-
-
Suzuki, S.1
Nakada, K.2
-
8
-
-
0842306939
-
HMRSVP: A hierarchical mobile RSVP protocol
-
April
-
C. Tseng, G. Lee, and R. Liu, "HMRSVP: A Hierarchical Mobile RSVP Protocol," in 2007 International Conference on Distributed Computing Systems Workshop, pp. 467-472, April 2001.
-
(2001)
2007 International Conference on Distributed Computing Systems Workshop
, pp. 467-472
-
-
Tseng, C.1
Lee, G.2
Liu, R.3
-
9
-
-
0032628983
-
Mobility management in next generation wireless systems
-
August
-
I. Akyildiz, J. McNair, J. Ho, H. Uzunalioglu, and W. Wang, "Mobility Management in Next Generation Wireless Systems," Proceedings of the IEEE, vol. 87, pp. 1347-1384, August 1999.
-
(1999)
Proceedings of the IEEE
, vol.87
, pp. 1347-1384
-
-
Akyildiz, I.1
McNair, J.2
Ho, J.3
Uzunalioglu, H.4
Wang, W.5
-
10
-
-
6344252245
-
Proxy chaining and policy implementation in roaming
-
June
-
B. Aboba and J. Vollbrecht, "Proxy Chaining and Policy Implementation in Roaming," RFC2607, June 1999.
-
(1999)
RFC2607
-
-
Aboba, B.1
Vollbrecht, J.2
-
11
-
-
0003329392
-
Mobile IP authentication, authorization and accounting requirements
-
October
-
S. Glass, T. Hiller, S. Jacobs, and C. Perkins, "Mobile IP Authentication, Authorization and Accounting Requirements," RFC2977, October 2000.
-
(2000)
RFC2977
-
-
Glass, S.1
Hiller, T.2
Jacobs, S.3
Perkins, C.4
-
12
-
-
0038065851
-
PPP EAP TLS authentication protocol
-
October
-
B. Aboba and D. Simon, "PPP EAP TLS Authentication Protocol," RFC2716, October 1999.
-
(1999)
RFC2716
-
-
Aboba, B.1
Simon, D.2
-
13
-
-
0003477171
-
Using the fluhrer, martin, and shamir attack to break WEB
-
August 21
-
A. Stubblefield, J. Ioannidis, and A. Rubin, "Using the Fluhrer, Martin, and Shamir Attack to Break WEB," AT&T Labs, August 21 2001.
-
(2001)
AT&T Labs
-
-
Stubblefield, A.1
Ioannidis, J.2
Rubin, A.3
|