메뉴 건너뛰기




Volumn 3, Issue , 2003, Pages 2775-2779

Security context transfer in vertical handover

Author keywords

Beyond 3G; Context transfer; Network security; Seamless handover; Security context; Vertical handover

Indexed keywords

BEYOND 3G; CONTEXT TRANSFER; SEAMLESS HANDOVER; SECURITY CONTEXT; VERTICAL HANDOVERS;

EID: 2642513688     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PIMRC.2003.1259248     Document Type: Conference Paper
Times cited : (27)

References (13)
  • 1
    • 11244271312 scopus 로고    scopus 로고
    • Draft Recommended Practice for Multi-Vendor Access Point Interoperability via an Inter-Access Point Protocol Across Distribution Systems Supporting IEEE 802.11 Operation
    • IEEE, January
    • IEEE, "Draft Recommended Practice for Multi-Vendor Access Point Interoperability via an Inter-Access Point Protocol Across Distribution Systems Supporting IEEE 802.11 Operation", IEEE standard P802.1 tf. January 2003
    • (2003) IEEE Standard P802.1 tf
  • 2
    • 0038661283 scopus 로고    scopus 로고
    • Problem Description: Reasons for Performing Context Transfers between Nodes in an IP Access Network
    • September
    • J. Kempf (ed.), "Problem Description: Reasons For Performing Context Transfers Between Nodes in an IP Access Network", RFC3374, September 2002.
    • (2002) RFC , vol.3374
    • Kempf, J.1
  • 12
    • 12244254308 scopus 로고    scopus 로고
    • Policy and trust in open multi-operator networks
    • Vienna, Austria, Kluwer Academic Publishers, September
    • P. Nikander, and L. Metso. "Policy and trust in open multi-operator networks", Proceedings of IFIP SmartNet 2000, pp.419-436, Vienna, Austria, Kluwer Academic Publishers, September 2000. [
    • (2000) Proceedings of IFIP SmartNet 2000 , pp. 419-436
    • Nikander, P.1    Metso, L.2
  • 13
    • 0010385203 scopus 로고    scopus 로고
    • 3GPP, Tech. spec., 3GPP TS 33.102 v 4.2.0, September
    • 3GPP, "3G Security, Security Architecture",Tech. spec., 3GPP TS 33.102 v 4.2.0, September 2001
    • (2001) 3G Security, Security Architecture


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.