-
1
-
-
33746089202
-
Security analysis on public wireless Internet service models
-
Cologne, Germany
-
K. Ohira, Y. Huang, Y. Okabe, K. Fujikawa, and M. Nakamura, "Security analysis on public wireless Internet service models," in Proceedings of the 3rd ACM International Workshop on Wireless mobile applications and services on WLAN hotspots, Cologne, Germany, 2005.
-
(2005)
Proceedings of the 3rd ACM International Workshop on Wireless mobile applications and services on WLAN hotspots
-
-
Ohira, K.1
Huang, Y.2
Okabe, Y.3
Fujikawa, K.4
Nakamura, M.5
-
3
-
-
4544342186
-
-
Wi-Fi Alliance, Feb, available at
-
B. Anton, B. Bullock, and J. Short, "Best current practices for wireless Internet service provider (WISP) roaming," Wi-Fi Alliance, Feb. 2003, available at http://www.weca.net/ OpenSection/wispr.asp
-
(2003)
Best current practices for wireless Internet service provider (WISP) roaming
-
-
Anton, B.1
Bullock, B.2
Short, J.3
-
4
-
-
38549158109
-
-
GSM Association, April 2003, available at
-
GSM Association. "WLAN roaming guidelines," April 2003, available at http://www.gsmworld.com/documents/wlan/ ir61.pdf
-
WLAN roaming guidelines
-
-
-
5
-
-
33244465417
-
Running Cellular/PWLAN services: Practical considerations for Cellular/PWLAN architecture supporting Interoperator roaming
-
February
-
J. Leu, R. Lai, H. Lin, and W. Shih, "Running Cellular/PWLAN services: practical considerations for Cellular/PWLAN architecture supporting Interoperator roaming," IEEE Communications Magazine, Vol. 44, No.2, pp.73-84, February 2006.
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.2
, pp. 73-84
-
-
Leu, J.1
Lai, R.2
Lin, H.3
Shih, W.4
-
6
-
-
4544224325
-
Localized authentication for wireless LAN Internetwork roaming
-
Atlanta, GA USA, March
-
M. Long, C.-H. Wu, and J. D. Irwin. "Localized authentication for wireless LAN Internetwork roaming", in Proceedings of IEEE Wireless Communications and Networking Conference, Atlanta, GA USA, March 2004.
-
(2004)
Proceedings of IEEE Wireless Communications and Networking Conference
-
-
Long, M.1
Wu, C.-H.2
Irwin, J.D.3
-
7
-
-
84887962704
-
A localized authentication, authorization, and accounting (AAA) protocol for mobile hotspots
-
Les Ménuires, France, January
-
S. Baek, S. Pack, T. Kwon, and Y. Choi, "A localized authentication, authorization, and accounting (AAA) protocol for mobile hotspots," in Proceedings of the Third Annual Conference on Wireless On Demand Network Systems and Services, Les Ménuires, France, January, 2006.
-
(2006)
Proceedings of the Third Annual Conference on Wireless On Demand Network Systems and Services
-
-
Baek, S.1
Pack, S.2
Kwon, T.3
Choi, Y.4
-
9
-
-
33646382089
-
A study of the energy consumption characteristics of cryptographic algorithms and security protocols
-
March-April
-
N. R. Potlapally, S. Ravi, A. Raghunathan, and N. K. Jha, "A study of the energy consumption characteristics of cryptographic algorithms and security protocols", IEEE Transactions. on Mobile Computing, Vol. 5, No. 2, pp. 128-143, March-April 2006.
-
(2006)
IEEE Transactions. on Mobile Computing
, vol.5
, Issue.2
, pp. 128-143
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
10
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions information Theory, Vol. 31, No. 4, pp. 469-472, 1985
-
(1985)
IEEE Transactions information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
11
-
-
24644449780
-
Efficient cooperative signature: A novel authentication scheme for sensor networks
-
Proceedings of SPC 2005, Spring-Verlag
-
S. Seys and B. Prenee, "Efficient cooperative signature: a novel authentication scheme for sensor networks," in Proceedings of SPC 2005, LNCS, Spring-Verlag, Vol. 3450, pp. 86-100, 2005.
-
(2005)
LNCS
, vol.3450
, pp. 86-100
-
-
Seys, S.1
Prenee, B.2
|