-
1
-
-
84898194443
-
Mobile WiMAX security
-
Airspan, "Mobile WiMAX security", Airspan Networks Inc. 2007. [Online]. Available: *http://www.airspan.com
-
(2007)
Airspan Networks Inc
-
-
-
2
-
-
3042685819
-
Overview of IEEE 802.16 security
-
May/June
-
D. Johnston and J. Walker, "Overview of IEEE 802.16 security", IEEE Security & Privacy, vol.2, no. 3, pp. 40-48, May/June 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.3
, pp. 40-48
-
-
Johnston, D.1
Walker, J.2
-
3
-
-
33646904325
-
An improved security scheme in WMAN based on IEEE standard 802.16
-
DOI 10.1109/WCNM.2005.1544255, 1544255, Proceedings - 2005 International Conference on Wireless Communications, Networking and Mobile Computing, WCNM 2005
-
F. Yang, H. Zhou, L. Zhang, and J. Feng. "An improved security scheme in wman based on ieee standard 802.16", in 2005 International Conference on Wireless Communications, Networking and Mobile Computing, 2005. (Pubitemid 43791349)
-
(2005)
Proceedings - 2005 International Conference on Wireless Communications, Networking and Mobile Computing, WCNM 2005
, vol.2
, pp. 1145-1148
-
-
Yang, F.1
Zhou, H.2
Zhang, L.3
Feng, J.4
-
4
-
-
34248381676
-
Security issues in privacy and key management protocols of IEEE 802.16
-
DOI 10.1145/1185448.1185474, Proceedings of the 44th ACM Southeast Conference, ACMSE 2006
-
S. Xu, M. M. Matthews, and C.-T. Huang, "Security issues in privacy and key management protocols of IEEE 802.16," in ACM Southeast Regional Conference, R. Menezes, Ed. ACM, 2006, pp. 113-118. (Pubitemid 46733453)
-
(2006)
Proceedings of the Annual Southeast Conference
, vol.2006
, pp. 113-118
-
-
Xu, S.1
Matthews, M.2
Huang, C.-T.3
-
5
-
-
85192036423
-
802.16e Notes
-
CA, USA
-
Datta A, He C. and Mitchell J.C, "802.16e Notes," Stanford University, CA, USA, 2005. [Online]. Available: *http://www.iab.org/ liaisons/ieee/EAP/802.16eNotes.pdf
-
(2005)
Stanford University
-
-
Datta, A.1
He, C.2
Mitchell, J.C.3
-
6
-
-
85192039657
-
Analysis of the PKMv2 protocol in IEEE 802.16e-2005 Using static analysis informatics and mathematical modeling
-
Yuksel E., "Analysis of the PKMv2 Protocol in IEEE 802.16e-2005 Using Static Analysis Informatics and Mathematical Modeling", TUD, 2007. [Online]. Available: *http://www2.imm.dtu.dk/pubdb/views/publication- details.ph p?id=5159
-
(2007)
TUD
-
-
Yuksel, E.1
-
7
-
-
85192043907
-
Analysis of 802.16e Multicast /Broadcast group privacy rekeying protocol
-
CA, USA
-
Ju-Yi Kuo, "Analysis of 802.16e Multicast /Broadcast group privacy rekeying protocol", Stanford University, CA, USA, 2006. [Online]. Available: *http://www.stanford.edu/ class/cs259/projects/project01/01- Writeup.pdf
-
(2006)
Stanford University
-
-
Ju-Yi, K.1
-
8
-
-
38049024684
-
An analysis of mobile WiMAX security: Vulnerabilities and solutions
-
Aug.
-
Taeshik Shon and Wook Choi, "An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions", Lecture Notes in Computer Science, vol.4658, pp. 88-97, Aug. 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4658
, pp. 88-97
-
-
Shon, T.1
Choi, W.2
|