-
1
-
-
0003330131
-
The network access identifier
-
Jan. 1999
-
Aboba, B., & Beadles, M. (1999). The network access identifier. RFC 2486, Jan. 1999.
-
(1999)
RFC
, vol.2486
-
-
Aboba, B.1
Beadles, M.2
-
2
-
-
6344233247
-
The Extensible Authentication Protocol (EAP)
-
Jun. 2004
-
Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., & Levkowetz, H. (2004). The Extensible Authentication Protocol (EAP). RFC 3748, Jun. 2004.
-
(2004)
RFC
, vol.3748
-
-
Aboba, B.1
Blunk, L.2
Vollbrecht, J.3
Carlson, J.4
Levkowetz, H.5
-
3
-
-
35649015782
-
EAP-AKA authentication
-
Jan. 2006
-
Arkko, J., & Haverinen, H. (2006). EAP-AKA authentication. RFC 4187, Jan. 2006.
-
(2006)
RFC
, vol.4187
-
-
Arkko, J.1
Haverinen, H.2
-
4
-
-
33645672701
-
-
Asokan, N., Niemi, V., & Nyberg, K. (2005). Man-in-the-middle in tunneled authentication protocols, 3364, 28-41.
-
(2005)
Man-in-the-middle in Tunneled Authentication Protocols
, vol.3364
, pp. 28-41
-
-
Asokan, N.1
Niemi, V.2
Nyberg, K.3
-
5
-
-
0034777649
-
Intercepting mobile communications: The insecurity of 802.11
-
Rome, Italy, Jul. 2001
-
Borisov, N., Goldberg, I., & Wagner, D. (2001). Intercepting mobile communications: The insecurity of 802.11. 7th ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM), Rome, Italy, Jul. 2001.
-
(2001)
7th ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM)
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
6
-
-
2942667311
-
Diameter base protocol
-
Sep. 2003
-
Calhoun, P., Loughney, J., Guttman, E., Zorn, G., & Arkko, J. (2003). Diameter base protocol. RFC 3588, Sep. 2003.
-
(2003)
RFC
, vol.3588
-
-
Calhoun, P.1
Loughney, J.2
Guttman, E.3
Zorn, G.4
Arkko, J.5
-
7
-
-
11244250732
-
Secure universal mobility for wireless internet
-
Philadelphia, USA, Oct. 2004
-
Dutta, A., Zhang, T., Madhani, S., Taniuchi, K., Fujimoto, K., Katsube, Y., Ohba, Y., & Schulzrinne, H. (2004). Secure universal mobility for wireless internet. Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots (WMASH), Philadelphia, USA, Oct. 2004.
-
(2004)
Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH)
-
-
Dutta, A.1
Zhang, T.2
Madhani, S.3
Taniuchi, K.4
Fujimoto, K.5
Katsube, Y.6
Ohba, Y.7
Schulzrinne, H.8
-
8
-
-
1542265638
-
US secure hash algorithm 1 (SHA1)
-
Sep. 2001
-
Eastlake, D., & Jones, P. (2001). US Secure Hash Algorithm 1 (SHA1). RFC 3174, Sep. 2001.
-
(2001)
RFC
, vol.3174
-
-
Eastlake, D.1
Jones, P.2
-
9
-
-
35248893698
-
IKEv2 mobility and multihoming protocol (MOBIKE)
-
Jun. 2006
-
Eronen, P. (2006). IKEv2 Mobility and Multihoming Protocol (MOBIKE). RFC 4555, Jun. 2006.
-
(2006)
RFC
, vol.4555
-
-
Eronen, P.1
-
10
-
-
33845536717
-
EAP-SIM authentication
-
Jan. 2006
-
Haverinen, H., & Saloway, J. (2006). EAP-SIM authentication. RFC 4186, Jan. 2006.
-
(2006)
RFC
, vol.4186
-
-
Haverinen, H.1
Saloway, J.2
-
11
-
-
33746646599
-
The Internet Key Exchange (IKEv2) protocol
-
Dec. 2005
-
Kaufman, C. (2005). The Internet Key Exchange (IKEv2) protocol. RFC 4306, Dec. 2005.
-
(2005)
RFC
, vol.4306
-
-
Kaufman, C.1
-
12
-
-
0003315821
-
IP Encapsulating Security Payload (ESP)
-
Nov. 1998
-
Kent, S., & Atkinson, R. (1998). IP Encapsulating Security Payload (ESP). RFC 2406, Nov. 1998.
-
(1998)
RFC
, vol.2406
-
-
Kent, S.1
Atkinson, R.2
-
13
-
-
0003244526
-
IP Authentication Header (AH)
-
Nov. 1998
-
Kent, S., & Atkinson, R. (1998). IP Authentication Header (AH). RFC 2402, Nov. 1998.
-
(1998)
RFC
, vol.2402
-
-
Kent, S.1
Atkinson, R.2
-
14
-
-
0003068282
-
Security architecture for internet protocol
-
Nov. 1998
-
Kent, S., & Atkinson, R. (1998). Security architecture for internet protocol. RFC 2401, Nov. 1998.
-
(1998)
RFC
, vol.2401
-
-
Kent, S.1
Atkinson, R.2
-
15
-
-
84879411411
-
Design of the mobike protocol
-
Aug. 2006
-
Kivinen, T., & Tschofenig, H. (2006). Design of the mobike protocol. RFC 4621, Aug. 2006.
-
(2006)
RFC
, vol.4621
-
-
Kivinen, T.1
Tschofenig, H.2
-
16
-
-
0003196107
-
HMAC: Keyed-hashing for message authentication
-
Feb. 1997
-
Krawczyk, H., Bellare, M., & Canetti, R. (1997). HMAC: Keyed-hashing for message authentication. RFC 2104, Feb. 1997.
-
(1997)
RFC
, vol.2104
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
17
-
-
0012446629
-
Generic AAA architecture
-
Aug. 2000
-
Laat, C., Gross, G., Gommans, L., Vollbrecht, J., & Spence, D. (2000). Generic AAA architecture. RFC 2903, Aug. 2000.
-
(2000)
RFC
, vol.2903
-
-
Laat, C.1
Gross, G.2
Gommans, L.3
Vollbrecht, J.4
Spence, D.5
-
18
-
-
35248829896
-
An enhanced EAP-SIM authentication scheme for securing WLAN
-
Myconos, Greece, Jun. 2006
-
Ntantogian, C., Xenakis, C., & Merakos, L. (2006). An enhanced EAP-SIM authentication scheme for securing WLAN. 15th IST Mobile & Wireless Communications, Myconos, Greece, Jun. 2006.
-
(2006)
15th IST Mobile & Wireless Communications
-
-
Ntantogian, C.1
Xenakis, C.2
Merakos, L.3
-
19
-
-
35248839406
-
Analysis of EAP-SIM session keys agreement
-
Patel, S. Analysis of EAP-SIM session keys agreement. Lucent Technologies.
-
Lucent Technologies
-
-
Patel, S.1
-
20
-
-
4544315117
-
On a framework for energy-efficient security protocols in wireless networks
-
17
-
Prasithsangaree, P., & Krishnamurthy, P. (2004). On a framework for energy-efficient security protocols in wireless networks. Computer Communications, 27(17), 1716-1729.
-
(2004)
Computer Communications
, vol.27
, pp. 1716-1729
-
-
Prasithsangaree, P.1
Krishnamurthy, P.2
-
21
-
-
24944532587
-
-
IEEE Wireless Communications and Networking Conference (WCNC), Mar. 2005
-
Rajavelsamy, R., Jeedigunta, V., Holur, B., Choudhary, M., & Song, O. (2005). Performance evaluation of VoIP over 3G-WLAN interworking system (Vol. 4, pp. 2312-2317). IEEE Wireless Communications and Networking Conference (WCNC), Mar. 2005.
-
(2005)
Performance Evaluation of VoIP over 3G-WLAN Interworking System
, vol.4
, pp. 2312-2317
-
-
Rajavelsamy, R.1
Jeedigunta, V.2
Holur, B.3
Choudhary, M.4
Song, O.5
-
22
-
-
0003312487
-
Remote Authentication Dial in User Services (RADIUS)
-
Apr. 1997
-
Rigney, C., Rubens, A., Simpson, W., & Willens, S. (1997). Remote Authentication Dial In User Services (RADIUS). RFC 2138, Apr. 1997.
-
(1997)
RFC
, vol.2138
-
-
Rigney, C.1
Rubens, A.2
Simpson, W.3
Willens, S.4
-
23
-
-
10044268801
-
Mobility support in IP: A survey of related protocols
-
6
-
Saha, D., Mukherjee, A., Misra, I. S., & Chakraborty, M. (2004). Mobility support in IP: A survey of related protocols. IEEE Network, 18(6), 34-40.
-
(2004)
IEEE Network
, vol.18
, pp. 34-40
-
-
Saha, D.1
Mukherjee, A.2
Misra, I.S.3
Chakraborty, M.4
-
24
-
-
3142658616
-
Interworking techniques and architectures for WLAN/3G integration toward 4G mobile data networks
-
3
-
Salkintzis, A. K. (2004). Interworking techniques and architectures for WLAN/3G integration toward 4G mobile data networks. IEEE Wireless Communications, 11(3), 50-61.
-
(2004)
IEEE Wireless Communications
, vol.11
, pp. 50-61
-
-
Salkintzis, A.K.1
-
25
-
-
3042632486
-
Counter with CBC MAC (CCM)
-
Sep. 2003
-
Whiting, D., Housley, R., & Ferguson, N. (2003). Counter with CBC MAC (CCM). RFC 3610, Sep. 2003.
-
(2003)
RFC
, vol.3610
-
-
Whiting, D.1
Housley, R.2
Ferguson, N.3
-
26
-
-
1642344382
-
Security in third generation mobile networks
-
7
-
Xenakis, C., & Merakos, L. (2004). Security in third generation mobile networks. Computer Communications, 27(7), 638-650.
-
(2004)
Computer Communications
, vol.27
, pp. 638-650
-
-
Xenakis, C.1
Merakos, L.2
-
27
-
-
33748564921
-
A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms
-
17
-
Xenakis, C., Laoutaris, N., Merakos, L., & Stavrakakis, I. (2006). A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms. Computer Networks, 50(17), 3225-3241.
-
(2006)
Computer Networks
, vol.50
, pp. 3225-3241
-
-
Xenakis, C.1
Laoutaris, N.2
Merakos, L.3
Stavrakakis, I.4
-
32
-
-
1642387595
-
-
3GPP TS 22.100 (v3.7.0) Oct. 2001
-
3GPP TS 22.100 (v3.7.0) (2001). UMTS phase 1 release '99, Oct. 2001.
-
(2001)
UMTS Phase 1 Release '99
-
-
|