메뉴 건너뛰기




Volumn , Issue , 2008, Pages 335-339

Security enhancements for Privacy and Key Management protocol in IEEE 802.16e-2005

Author keywords

[No Author keywords available]

Indexed keywords

HYBRID APPROACHES; IEEE 802.16E; MANAGEMENT PROTOCOLS; MOBILE WIMAX; REPLAY ATTACKS; SECURITY ENHANCEMENTS; SECURITY SOLUTIONS; SHORT-COMINGS; TIME STAMPS; WIRELESS COMMUNICATIONS; WIRELESS MEDIAS;

EID: 57749204596     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SNPD.2008.138     Document Type: Conference Paper
Times cited : (15)

References (13)
  • 1
    • 50249157665 scopus 로고    scopus 로고
    • School of Computer Science Carleton University, Ontario, Canada, October
    • Michel Barbeau, "WiMax/802.16 Threat Analysis", School of Computer Science Carleton University, Ontario, Canada, October, 2005.
    • (2005) WiMax/802.16 Threat Analysis
    • Barbeau, M.1
  • 2
    • 57749171668 scopus 로고    scopus 로고
    • IEEE Std. 802.16e/D12, IEEE Standard for Local and Metropolitan Area Networks, part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems, IEEE Press, 2005.
    • IEEE Std. 802.16e/D12, "IEEE Standard for Local and Metropolitan Area Networks, part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems", IEEE Press, 2005.
  • 5
    • 55849128397 scopus 로고    scopus 로고
    • Security Issues of IEEE 802.16 (WiMAX)
    • Edith Cowan University, Australia
    • Jamshed Hasan /'Security Issues of IEEE 802.16 (WiMAX)", School of Computer and Information Science, Edith Cowan University, Australia 2006.
    • (2006) School of Computer and Information Science
    • Hasan, J.1
  • 6
    • 57749188795 scopus 로고    scopus 로고
    • IEEE Std. 802.16-2004. Copyright IEEE 2004.
    • IEEE Std. 802.16-2004. Copyright IEEE 2004.
  • 7
    • 3042685819 scopus 로고    scopus 로고
    • Overview of IEEE 802.16 security
    • David Johnston and Jesse Walker, "Overview of IEEE 802.16 security", 2004.
    • (2004)
    • Johnston, D.1    Walker, J.2
  • 8
    • 55849136759 scopus 로고    scopus 로고
    • Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions
    • University of South Carolina, Columbia, September
    • Sen Xu, Chin-Tser Huang, "Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions", Computer Science and Engineering Department, University of South Carolina, Columbia, September, 2006.
    • (2006) Computer Science and Engineering Department
    • Xu, S.1    Huang, C.-T.2
  • 11
    • 20144369157 scopus 로고    scopus 로고
    • Department of Mathematics and Computer Science, University of Leicester, January
    • Gavin Lowe, "A Family of Attacks upon Authentication Protocols", Department of Mathematics and Computer Science, University of Leicester, January, 1997.
    • (1997) A Family of Attacks upon Authentication Protocols
    • Lowe, G.1
  • 13
    • 57749174750 scopus 로고
    • A Security Risk of depending on Synchronized Clocks
    • September 24
    • Li Gong, "A Security Risk of depending on Synchronized Clocks", ORA Corporation and Cornell University, September 24, 1991.
    • (1991) ORA Corporation and Cornell University
    • Gong, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.