-
1
-
-
4544342186
-
-
February
-
Anton, B., Bullock, B. and Short, J. (2003) Best Current Practices for Wireless Internet Service Provider (WISP) Roaming, Wi-Fi Alliance, February.
-
(2003)
Best Current Practices for Wireless Internet Service Provider (WISP) Roaming, Wi-Fi Alliance
-
-
Anton, B.1
Bullock, B.2
Short, J.3
-
2
-
-
84887962704
-
A localized authentication, authorization, and accounting (AAA) protocol for mobile hotspots
-
France, January, pp
-
Baek, S., Pack, S., Kwon, T. and Choi, Y. (2006) 'A localized authentication, authorization, and accounting (AAA) protocol for mobile hotspots', Proceedings of the Third Annual Conference on Wireless on Demand Network Systems and Services, Les Ménuires, France, January, pp. 144-153.
-
(2006)
Proceedings of the Third Annual Conference on Wireless on Demand Network Systems and Services, Les Ménuires
, pp. 144-153
-
-
Baek, S.1
Pack, S.2
Kwon, T.3
Choi, Y.4
-
3
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
July, pp
-
ElGamal, T. (1985) 'A public key cryptosystem and a signature scheme based on discrete logarithms', IEEE Transactions on Information Theory, Vol. 31, No. 4, July, pp.469-472.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
4
-
-
0032690197
-
Teletraffic analysis and mobility modeling of PCS networks
-
July, pp
-
Fang, Y. and Chlamtac, I. (1999) 'Teletraffic analysis and mobility modeling of PCS networks', IEEE Transactions on Communications, Vol. 47, No. 7, July, pp.1062-1072.
-
(1999)
IEEE Transactions on Communications
, vol.47
, Issue.7
, pp. 1062-1072
-
-
Fang, Y.1
Chlamtac, I.2
-
5
-
-
23944459661
-
Public key cryptography in sensor networks - revisited', ESAS
-
Gaubatz, G., Kaps, J.P. and Sunar, B. (2005) 'Public key cryptography in sensor networks - revisited', ESAS, LNCS 3313, pp.2-18.
-
(2005)
LNCS
, vol.3313
, pp. 2-18
-
-
Gaubatz, G.1
Kaps, J.P.2
Sunar, B.3
-
7
-
-
33645352668
-
-
RFC 2903, Internet Engineering Task Force IETF
-
Laat, c.d., Gross, G., Gommans, L., Vollbrecht, J. and Spence, D. (2000) 'Generic AAA architecture', RFC 2903, Internet Engineering Task Force (IETF).
-
(2000)
Generic AAA architecture
-
-
Laat, C.D.1
Gross, G.2
Gommans, L.3
Vollbrecht, J.4
Spence, D.5
-
8
-
-
33244465417
-
Running Cellular/PWLAN services: Practical considerations for Cellular/PWLAN architecture supporting interoperator roaming
-
July, pp
-
Leu, J., Lai, R., Lin, H. and Shih, W. (2006) 'Running Cellular/PWLAN services: Practical considerations for Cellular/PWLAN architecture supporting interoperator roaming', IEEE Communications Magazine, Vol. 44, No. 2, July, pp.73-84.
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.2
, pp. 73-84
-
-
Leu, J.1
Lai, R.2
Lin, H.3
Shih, W.4
-
9
-
-
4544224325
-
Localized authentication for wireless LAN Internetwork roaming
-
Atlanta, GA USA, March, pp
-
Long, M., Wu, C-H. and Irwin, J.D. (2004) 'Localized authentication for wireless LAN Internetwork roaming', Proceedings of IEEE Wireless Communications and Networking Conference, Atlanta, GA USA, March, pp.264-267.
-
(2004)
Proceedings of IEEE Wireless Communications and Networking Conference
, pp. 264-267
-
-
Long, M.1
Wu, C.-H.2
Irwin, J.D.3
-
10
-
-
0030150440
-
Distributed call admission control in mobile/wireless networks
-
May, pp
-
Naghshinel, M. and Schwartz, M. (1996) 'Distributed call admission control in mobile/wireless networks', IEEE Journal on Selected Areas in Communications, Vol. 14, No. 4, May, pp.711-717.
-
(1996)
IEEE Journal on Selected Areas in Communications
, vol.14
, Issue.4
, pp. 711-717
-
-
Naghshinel, M.1
Schwartz, M.2
-
11
-
-
33746089202
-
Security analysis on public wireless Internet service models
-
Cologne, Germany, September, pp
-
Ohira, K., Huang, Y., Okabe, Y., Fujikawa, K. and Nakamura, M. (2005) 'Security analysis on public wireless Internet service models', Proceedings of the 3rd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, Cologne, Germany, September, pp. 107-110.
-
(2005)
Proceedings of the 3rd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots
, pp. 107-110
-
-
Ohira, K.1
Huang, Y.2
Okabe, Y.3
Fujikawa, K.4
Nakamura, M.5
-
12
-
-
0030106013
-
Trends in handover design
-
January, pp
-
Pollini, G.P. (1996) 'Trends in handover design', IEEE Communications Magazine, Vol. 34, No. 3, January, pp.82-90.
-
(1996)
IEEE Communications Magazine
, vol.34
, Issue.3
, pp. 82-90
-
-
Pollini, G.P.1
-
13
-
-
33646382089
-
A study of the energy consumption characteristics of cryptographic algorithms and security protocols
-
February, pp
-
Potlapally, N.R., Ravi, S., Raghunathan, A. and Jha, N.K. (2006) 'A study of the energy consumption characteristics of cryptographic algorithms and security protocols', IEEE Transactions on Mobile Computing, Vol. 5, No. 2, February, pp. 128-143.
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.2
, pp. 128-143
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
14
-
-
85086419657
-
-
Digitized Signatures and Public-key Functions as Intractable as Factorization, Technical Report, Massachusetts Institute of Technology, Cambridge, MA, USA
-
Rabin, M.O. (1979) Digitized Signatures and Public-key Functions as Intractable as Factorization, Technical Report, Massachusetts Institute of Technology, Cambridge, MA, USA.
-
(1979)
-
-
Rabin, M.O.1
-
15
-
-
35148874531
-
A service agent based roaming architecture for WLAN/Cellular integrated networks
-
July, pp
-
Shi, M., Rutagemwa, H., Shen, X.S., Mark, J.W. and Saleh, A. (2007) 'A service agent based roaming architecture for WLAN/Cellular integrated networks', IEEE Transactions on Vehicular Technology, Vol. 56, No. 4, July, pp.3168-3181.
-
(2007)
IEEE Transactions on Vehicular Technology
, vol.56
, Issue.4
, pp. 3168-3181
-
-
Shi, M.1
Rutagemwa, H.2
Shen, X.S.3
Mark, J.W.4
Saleh, A.5
-
16
-
-
32844472126
-
Mobility pattern in microcellular wireless networks
-
January, pp
-
Thajchayapong, S. and Peha, J.M. (2006) 'Mobility pattern in microcellular wireless networks', IEEE Transactions on Mobile Computing, Vol. 5, No. 1, January, pp.52-63.
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.1
, pp. 52-63
-
-
Thajchayapong, S.1
Peha, J.M.2
-
17
-
-
0019080452
-
A modification of the RSA public-key encryption procedure
-
November, pp
-
Williams, H.C. (1980) 'A modification of the RSA public-key encryption procedure', IEEE Transactions on Information Theory, Vol. 26, No. 6, November, pp.726-729.
-
(1980)
IEEE Transactions on Information Theory
, vol.26
, Issue.6
, pp. 726-729
-
-
Williams, H.C.1
-
18
-
-
3142746310
-
Impact of handoff protection strategies on cellular mobile system capacity
-
July, pp
-
Xu, Y., Ding, Q. and Ko, CC. (2004) 'Impact of handoff protection strategies on cellular mobile system capacity', IEEE Transactions on Wireless Communications, Vol. 3, No. 4, July, pp. 1076-1087.
-
(2004)
IEEE Transactions on Wireless Communications
, vol.3
, Issue.4
, pp. 1076-1087
-
-
Xu, Y.1
Ding, Q.2
Ko, C.C.3
-
19
-
-
33749856769
-
ARSA: An attack-resilient security architecture for multi-hop wireless mesh networks
-
October, pp
-
Zhang, Y. and Fang, Y. (2006) 'ARSA: An attack-resilient security architecture for multi-hop wireless mesh networks', IEEE Journal on Selected Areas in Communications, Vol. 24, No. 10, October, pp. 1916-1928.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.10
, pp. 1916-1928
-
-
Zhang, Y.1
Fang, Y.2
-
20
-
-
34547545598
-
A secure authentication and billing architecture for wireless mesh networks
-
October, pp
-
Zhang, Y. and Fang, Y. (2007) 'A secure authentication and billing architecture for wireless mesh networks', ACM Wireless Networks, Vol. 13, No. 5, October, pp.663-678.
-
(2007)
ACM Wireless Networks
, vol.13
, Issue.5
, pp. 663-678
-
-
Zhang, Y.1
Fang, Y.2
|