-
3
-
-
35649015782
-
EAP-AKA authentication
-
Jan. 2006
-
Arkko, J., & Haverinen, H. (2006). EAP-AKA authentication. RFC 4187, Jan. 2006.
-
(2006)
RFC
, vol.4187
-
-
Arkko, J.1
Haverinen, H.2
-
4
-
-
33746646599
-
The internet key exchange (IKEv2) protocol
-
Dec. 2005
-
Kaufman, C. (2005). The internet key exchange (IKEv2) protocol. RFC 4306, Dec. 2005.
-
(2005)
RFC
, vol.4306
-
-
Kaufman, C.1
-
5
-
-
35248840517
-
Security architectures for B3G mobile networks
-
10.1007/s11235-007-9044-2
-
C. Xenakis C. Ntantogian 2007 Security architectures for B3G mobile networks Telecommunication Systems 35 123 139 10.1007/s11235-007-9044-2
-
(2007)
Telecommunication Systems
, vol.35
, pp. 123-139
-
-
Xenakis, C.1
Ntantogian, C.2
-
6
-
-
16644376971
-
On performance analysis of challenge/response based authentication in wireless networks
-
2
-
W. Liang W. Wang 2005 On performance analysis of challenge/response based authentication in wireless networks Computer Networks 48 2 267 288
-
(2005)
Computer Networks
, vol.48
, pp. 267-288
-
-
Liang, W.1
Wang, W.2
-
7
-
-
33748634936
-
An improvement for authentication protocol in third generation wireless networks
-
9. 10.1109/TWC.2006.1687756
-
Y. Zhang M. Fujise 2006 An improvement for authentication protocol in third generation wireless networks IEEE Transactions on Wireless Communications 5 9 2348 2352 10.1109/TWC.2006.1687756
-
(2006)
IEEE Transactions on Wireless Communications
, vol.5
, pp. 2348-2352
-
-
Zhang, Y.1
Fujise, M.2
-
8
-
-
3042836953
-
Reducing authentication signalling traffic in third-generation mobile network
-
3. 10.1109/TWC.2003.811171
-
Y.B. Lin Y.K. Chen 2003 Reducing authentication signalling traffic in third-generation mobile network IEEE Transactions on Wireless Communications 2 3 493 501 10.1109/TWC.2003.811171
-
(2003)
IEEE Transactions on Wireless Communications
, vol.2
, pp. 493-501
-
-
Lin, Y.B.1
Chen, Y.K.2
-
11
-
-
33748420089
-
A robust authentication protocol with non-repudiation service for integrating WLAN and 3G network
-
2. 10.1007/s11277-006-9090-1
-
C.C. Yang Y.W. Yang W.T. Liu 2006 A robust authentication protocol with non-repudiation service for integrating WLAN and 3G network Wireless Personal Communications 39 2 229 251 10.1007/s11277-006-9090-1
-
(2006)
Wireless Personal Communications
, vol.39
, pp. 229-251
-
-
Yang, C.C.1
Yang, Y.W.2
Liu, W.T.3
-
13
-
-
15344347736
-
A new authentication mechanism for loosely coupled 3G-WLAN integrated networks
-
May 2004
-
Prasithsangaree, P., & Krishnamurthy, P. (2004). A new authentication mechanism for loosely coupled 3G-WLAN integrated networks. In IEEE 59th Vehicular Technology Conference, (VTC) (Vol. 5, pp. 2998-3003), May 2004.
-
(2004)
IEEE 59th Vehicular Technology Conference, (VTC)
, vol.5
, pp. 2998-3003
-
-
Prasithsangaree, P.1
Krishnamurthy, P.2
-
14
-
-
17144420127
-
A local authentication control scheme based on AAA architecture in wireless networks
-
Sep. 2004
-
Liang, W., & Wang, W. (2004). A local authentication control scheme based on AAA architecture in wireless networks. In IEEE 60th Vehicular Technology Conference (VTC) (Vol. 7, pp. 5276-5280), Sep. 2004.
-
(2004)
IEEE 60th Vehicular Technology Conference (VTC)
, vol.7
, pp. 5276-5280
-
-
Liang, W.1
Wang, W.2
-
17
-
-
2942667311
-
Diameter base protocol
-
Sep. 2003
-
Calhoun, P., Loughney, J., Guttman, E., Zorn, G., & Arkko, J. (2003). Diameter base protocol. RFC 3588, Sep. 2003.
-
(2003)
RFC
, vol.3588
-
-
Calhoun, P.1
Loughney, J.2
Guttman, E.3
Zorn, G.4
Arkko, J.5
-
19
-
-
0003068282
-
Security architecture for internet protocol
-
Nov. 1998
-
Kent, S., & Atkinson, R. (1998). Security architecture for internet protocol. RFC 2401, Nov. 1998.
-
(1998)
RFC
, vol.2401
-
-
Kent, S.1
Atkinson, R.2
-
20
-
-
0003315821
-
IP encapsulating security payload (ESP)
-
Nov. 1998
-
Kent, S., & Atkinson, R. (1998). IP encapsulating security payload (ESP). RFC 2406, Nov. 1998.
-
(1998)
RFC
, vol.2406
-
-
Kent, S.1
Atkinson, R.2
-
21
-
-
1642344382
-
Security in third generation mobile networks
-
7
-
C. Xenakis L. Merakos 2004 Security in third generation mobile networks Computer Communications 27 7 638 650
-
(2004)
Computer Communications
, vol.27
, pp. 638-650
-
-
Xenakis, C.1
Merakos, L.2
-
24
-
-
1542269608
-
Analyzing the energy consumption of security protocols
-
Seoul, Korea, Aug. 2003
-
Potlapally, N. R., Ravi, S., Raghunathan, A., & Jha, N. K. (2003). Analyzing the energy consumption of security protocols. In International Symposium on Low Power Electronics and Design (ISLPED), Seoul, Korea, Aug. 2003.
-
(2003)
International Symposium on Low Power Electronics and Design (ISLPED)
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
|