메뉴 건너뛰기




Volumn , Issue , 2007, Pages

Reducing authentication traffic in 3G-WLAN integrated networks

Author keywords

[No Author keywords available]

Indexed keywords

MESSAGE PASSING; NETWORK ARCHITECTURE; PACKET SWITCHING; SECURITY OF DATA; TELECOMMUNICATION TRAFFIC; WIRELESS LOCAL AREA NETWORKS (WLAN);

EID: 44349134985     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PIMRC.2007.4394508     Document Type: Conference Paper
Times cited : (5)

References (9)
  • 1
    • 44349083892 scopus 로고    scopus 로고
    • 3GPP TS 23.234 v7.3.0, 3GPP System to WLAN Interworking; System description, Release 7, Sep. 2006
    • 3GPP TS 23.234 (v7.3.0), "3GPP System to WLAN Interworking; System description ", Release 7, Sep. 2006.
  • 2
    • 44349095178 scopus 로고    scopus 로고
    • 3GPP TS 33.234 v7.2.0, 3G security; WLAN interworking security; System description, Release 1, Sep. 2006
    • 3GPP TS 33.234 (v7.2.0), "3G security; WLAN interworking security; System description ", Release 1, Sep. 2006.
  • 3
    • 44349118235 scopus 로고    scopus 로고
    • IEEE Std 802.11i, Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Medium Access Control (MAC) Security Enhancements , 2004.
    • IEEE Std 802.11i, "Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Medium Access Control (MAC) Security Enhancements ", 2004.
  • 8
    • 1642344382 scopus 로고    scopus 로고
    • Security in third Generation Mobile Networks, Computer Communications, Elsevier
    • May
    • C. Xenakis, L. Merakos, "Security in third Generation Mobile Networks", Computer Communications, Elsevier Science, Vol.21, No. 7, pp 638-650, May 2004.
    • (2004) Science , vol.21 , Issue.7 , pp. 638-650
    • Xenakis, C.1    Merakos, L.2
  • 9
    • 33645672701 scopus 로고    scopus 로고
    • Man-in-the-Middle in Tunneled Authentication Protocols
    • Springer
    • N. Asokan, V. Niemi, K. Nyberg. "Man-in-the-Middle in Tunneled Authentication Protocols". Lecture Notes in Computer Science, Vol. 3364, pp. 28-41, Springer 2005.
    • (2005) Lecture Notes in Computer Science , vol.3364 , pp. 28-41
    • Asokan, N.1    Niemi, V.2    Nyberg, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.