메뉴 건너뛰기




Volumn , Issue , 2008, Pages 828-833

Analysis of mobile wimax security: Vulnerabilities and solutions

Author keywords

[No Author keywords available]

Indexed keywords

INTERNET PROTOCOLS; INTEROPERABILITY; MOBILE SECURITY; NETWORK SECURITY; WIMAX;

EID: 67650679649     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MAHSS.2008.4660134     Document Type: Conference Paper
Times cited : (33)

References (8)
  • 1
    • 84898194443 scopus 로고    scopus 로고
    • Mobile WiMAX security
    • Airspan, "Mobile WiMAX security", Airspan Networks Inc. 2007. [Online]. Available: *http://www.airspan.com
    • (2007) Airspan Networks Inc
  • 2
    • 3042685819 scopus 로고    scopus 로고
    • Overview of IEEE 802.16 security
    • May/June
    • D. Johnston and J. Walker, "Overview of IEEE 802.16 security", IEEE Security & Privacy, vol.2, no. 3, pp. 40-48, May/June 2004.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.3 , pp. 40-48
    • Johnston, D.1    Walker, J.2
  • 4
    • 34248381676 scopus 로고    scopus 로고
    • Security issues in privacy and key management protocols of IEEE 802.16
    • DOI 10.1145/1185448.1185474, Proceedings of the 44th ACM Southeast Conference, ACMSE 2006
    • S. Xu, M. M. Matthews, and C.-T. Huang, "Security issues in privacy and key management protocols of IEEE 802.16," in ACM Southeast Regional Conference, R. Menezes, Ed. ACM, 2006, pp. 113-118. (Pubitemid 46733453)
    • (2006) Proceedings of the Annual Southeast Conference , vol.2006 , pp. 113-118
    • Xu, S.1    Matthews, M.2    Huang, C.-T.3
  • 5
    • 85192036423 scopus 로고    scopus 로고
    • 802.16e Notes
    • CA, USA
    • Datta A, He C. and Mitchell J.C, "802.16e Notes," Stanford University, CA, USA, 2005. [Online]. Available: *http://www.iab.org/ liaisons/ieee/EAP/802.16eNotes.pdf
    • (2005) Stanford University
    • Datta, A.1    He, C.2    Mitchell, J.C.3
  • 6
    • 85192039657 scopus 로고    scopus 로고
    • Analysis of the PKMv2 protocol in IEEE 802.16e-2005 Using static analysis informatics and mathematical modeling
    • Yuksel E., "Analysis of the PKMv2 Protocol in IEEE 802.16e-2005 Using Static Analysis Informatics and Mathematical Modeling", TUD, 2007. [Online]. Available: *http://www2.imm.dtu.dk/pubdb/views/publication- details.ph p?id=5159
    • (2007) TUD
    • Yuksel, E.1
  • 7
    • 85192043907 scopus 로고    scopus 로고
    • Analysis of 802.16e Multicast /Broadcast group privacy rekeying protocol
    • CA, USA
    • Ju-Yi Kuo, "Analysis of 802.16e Multicast /Broadcast group privacy rekeying protocol", Stanford University, CA, USA, 2006. [Online]. Available: *http://www.stanford.edu/ class/cs259/projects/project01/01- Writeup.pdf
    • (2006) Stanford University
    • Ju-Yi, K.1
  • 8
    • 38049024684 scopus 로고    scopus 로고
    • An analysis of mobile WiMAX security: Vulnerabilities and solutions
    • Aug.
    • Taeshik Shon and Wook Choi, "An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions", Lecture Notes in Computer Science, vol.4658, pp. 88-97, Aug. 2007.
    • (2007) Lecture Notes in Computer Science , vol.4658 , pp. 88-97
    • Shon, T.1    Choi, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.