-
1
-
-
32144444346
-
-
M. Barbeau, WiMAX/802.16 Threat Analysis, Proc. the 1st ACM international workshop on Quality of service & security in wireless and mobile networks (Q2SWinet'05), pp. 8-15, 2005.
-
M. Barbeau, "WiMAX/802.16 Threat Analysis," Proc. the 1st ACM international workshop on Quality of service & security in wireless and mobile networks (Q2SWinet'05), pp. 8-15, 2005.
-
-
-
-
2
-
-
13244299564
-
-
RFC 3748, June
-
B Aboba, L Blunk, J Vollbrecht and J Carlson, "Extensible Authentication Protocol, EAP," RFC 3748, June 2004.
-
(2004)
Extensible Authentication Protocol, EAP
-
-
Aboba, B.1
Blunk, L.2
Vollbrecht, J.3
Carlson, J.4
-
4
-
-
67549087022
-
-
WiMAX forum, WiMAX End-to-End Network Systems Architecture Stage 2-3 Release 1.1.0, July, 11, 2007
-
WiMAX forum, "WiMAX End-to-End Network Systems Architecture Stage 2-3 Release 1.1.0.," July, 11, 2007.
-
-
-
-
6
-
-
67549145570
-
-
IEEE Std 802.11, 1999 Edition (ISO/IEC 8802-11: 1999), IEEE Standard for Information Technology - Telecommunications and Information Exchange between Systems - Local and Metropolitan Area Network - Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications.
-
IEEE Std 802.11, 1999 Edition (ISO/IEC 8802-11: 1999), IEEE Standard for Information Technology - Telecommunications and Information Exchange between Systems - Local and Metropolitan Area Network - Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications.
-
-
-
-
7
-
-
36348987156
-
-
RFC3580, September
-
P. Congdon, B. Aboba, A. Smith, G. Zorn, and J. Roese, "IEEE 802.1 X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines," RFC3580, September, 2003.
-
(2003)
IEEE 802.1 X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines
-
-
Congdon, P.1
Aboba, B.2
Smith, A.3
Zorn, G.4
Roese, J.5
-
8
-
-
67549093845
-
-
IEEE Std 802.11i-2004: Amendment 6: Medium Access Control (MAC) Security Enhancements, 2004.
-
IEEE Std 802.11i-2004: Amendment 6: Medium Access Control (MAC) Security Enhancements, 2004.
-
-
-
-
9
-
-
67549135098
-
-
IEEE Std 802.11F-2003: IEEE Recommended Practice for Multi-Vendor Access Point Interoperability via an Inter-Access Point Protocol Across Distribution Systems Supporting IEEE 802.11 Operation, 2003.
-
IEEE Std 802.11F-2003: IEEE Recommended Practice for Multi-Vendor Access Point Interoperability via an Inter-Access Point Protocol Across Distribution Systems Supporting IEEE 802.11 Operation, 2003.
-
-
-
-
10
-
-
67549112861
-
-
IEEE 802.16e-2005 March 2006, Physical and Medium Access Control Layers for Combined Fixed and Mobile 6 Operation in Licensed Bands, 2005.
-
IEEE 802.16e-2005 March 2006, Physical and Medium Access Control Layers for Combined Fixed and Mobile 6 Operation in Licensed Bands, 2005.
-
-
-
-
11
-
-
67549139101
-
-
S. Pack and Y. Choi, Fast Inter-AP Handoff Using Predictive-Authentication Scheme in a Public Wireless LAN, The joint conf. ICWLHN 2002 and ICN 2002, pp. 15-26, Aug. 2002.
-
S. Pack and Y. Choi, "Fast Inter-AP Handoff Using Predictive-Authentication Scheme in a Public Wireless LAN," The joint conf. ICWLHN 2002 and ICN 2002, pp. 15-26, Aug. 2002.
-
-
-
-
12
-
-
84904326049
-
Pre-Authenticated Fast Handoff in a Public Wireless LAN based on IEEE 802.1x Model
-
Oct
-
S. Pack and Y. Choi, "Pre-Authenticated Fast Handoff in a Public Wireless LAN based on IEEE 802.1x Model," IFIP TC6 Pers. Wireless Commun., pp. 175- 182, Oct. 2002.
-
(2002)
IFIP TC6 Pers. Wireless Commun
, vol.182
, pp. 175
-
-
Pack, S.1
Choi, Y.2
-
13
-
-
8344271253
-
INFOCOM 2004. Twenty-third AnnualJoint Conf. the IEEE Computer and Communications Societies
-
Mishra, M. H. Shin, and W. A. Arbaugh, "Context caching using neighbor graphs for fast handoffs in a wireless network," INFOCOM 2004. Twenty-third AnnualJoint Conf. the IEEE Computer and Communications Societies, pp. 351-361, 2004.
-
(2004)
, pp. 351-361
-
-
Mishra, M.1
Shin, H.2
Arbaugh, W.A.3
-
14
-
-
39049103023
-
-
T. Joshi, A. Mukherjee and D. P. Agrawal, Exploiting Mobility Patterns to Reduce re-authentication Overheads in Infrastructure WLAN Networks, IEEE Conf. Electrical and Computer Engineering (CCECE '06), pp. 1423-1426, 2006.
-
T. Joshi, A. Mukherjee and D. P. Agrawal, "Exploiting Mobility Patterns to Reduce re-authentication Overheads in Infrastructure WLAN Networks," IEEE Conf. Electrical and Computer Engineering (CCECE '06), pp. 1423-1426, 2006.
-
-
-
-
15
-
-
11244321843
-
-
M. S. Bargh, R.J. Hulsebosch, E.H. Eertink, A. Prasad, H.Wang, and P. Schoo, Fast authentication methods for handovers between IEEE 802.11 wireless LANs, Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots (WMASH'04), pp. 51-60, 2004.
-
M. S. Bargh, R.J. Hulsebosch, E.H. Eertink, A. Prasad, H.Wang, and P. Schoo, "Fast authentication methods for handovers between IEEE 802.11 wireless LANs," Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots (WMASH'04), pp. 51-60, 2004.
-
-
-
-
16
-
-
32144451516
-
-
M. Kassab, A. Belghith, J. Bonnin, and S. Sassi, Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks, Proc. the 1st ACM workshop on Wireless multimedia networking and performance modeling (WMuNep'05), pp. 46-53, 2005.
-
M. Kassab, A. Belghith, J. Bonnin, and S. Sassi, "Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks," Proc. the 1st ACM workshop on Wireless multimedia networking and performance modeling (WMuNep'05), pp. 46-53, 2005.
-
-
-
-
17
-
-
42549128811
-
-
L. Maccari, R. Fantacci, T. Pecorella, and F. Frosali, Secure, fast handhoff techniques for 802.1X based wireless network, IEEE International Conf. Communications (ICC '06), pp. 3917-3922, 2006.
-
L. Maccari, R. Fantacci, T. Pecorella, and F. Frosali, "Secure, fast handhoff techniques for 802.1X based wireless network," IEEE International Conf. Communications (ICC '06), pp. 3917-3922, 2006.
-
-
-
-
18
-
-
42149128835
-
-
M. Komarova, and M. Riguidel, Optimized ticket distribution scheme for fast re-authentication protocol (fap), Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks (Q2SWinet'07), pp. 71-77, 2007.
-
M. Komarova, and M. Riguidel, "Optimized ticket distribution scheme for fast re-authentication protocol (fap)," Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks (Q2SWinet'07), pp. 71-77, 2007.
-
-
-
-
19
-
-
47749128857
-
-
K. Chang and C. T. Huang, Fast and Secure Mobility for IEEE 802.16e Broadband Wireless Networks, International Conf. Parallel Processing Workshops (ICPPW2007), pp. 46-52, 2007.
-
K. Chang and C. T. Huang, "Fast and Secure Mobility for IEEE 802.16e Broadband Wireless Networks," International Conf. Parallel Processing Workshops (ICPPW2007), pp. 46-52, 2007.
-
-
-
-
20
-
-
0003195066
-
The MD5 Message-Digest Algorithm
-
RFC
-
R. L. Rivest, "The MD5 Message-Digest Algorithm," Request for Comments (RFC) 1321, 1992.
-
(1992)
Request for Comments
, pp. 1321
-
-
Rivest, R.L.1
-
21
-
-
0003629991
-
-
FIPS Publication 180-1, NIST, U.S. Department of Commerce, Washington, D.C, April
-
FIPS Publication 180-1, "Secure hash standard," NIST, U.S. Department of Commerce, Washington, D.C., April 1995.
-
(1995)
Secure hash standard
-
-
-
22
-
-
67549147308
-
-
IEEE Std 802.16 - 2004, IEEE Standard for Local and metropolitan area networks, Part 16: Air Interface for Fixed Broadband Wireless Access Systems.
-
IEEE Std 802.16 - 2004, IEEE Standard for Local and metropolitan area networks, Part 16: Air Interface for Fixed Broadband Wireless Access Systems.
-
-
-
|