-
4
-
-
34249066084
-
Wireless Broadband Access: WiMax and Beyond-A Secure and Service-Oriented Network Control Framework for WiMAX Networks
-
May
-
K.Lu, Y.Qian and H.-H.Chen, "Wireless Broadband Access: WiMax and Beyond-A Secure and Service-Oriented Network Control Framework for WiMAX Networks," IEEE Comm. Mag., May 2007, pp. 124-130.
-
(2007)
IEEE Comm. Mag.
, pp. 124-130
-
-
Lu, K.1
Qian, Y.2
Chen, H.-H.3
-
5
-
-
47949102706
-
A Security Scheme for Centralized Scheduling in IEEE 802.16 Mesh Networks
-
B.Kwon, et al., "A Security Scheme for Centralized Scheduling in IEEE 802.16 Mesh Networks," Proc. of Military Comm. Conf., 2007, pp. 1-5.
-
(2007)
Proc. of Military Comm. Conf.
, pp. 1-5
-
-
Kwon, B.1
-
6
-
-
62349089008
-
A Simple Key Management Scheme Based on WiMAX
-
W-M-Lang,, R-S Wu and J-Q Wang, "A Simple Key Management Scheme Based on WiMAX," Proc. of Int'l Symp. On Comp. Science and Computational Tech., 2008, pp. 3-6.
-
Proc. of Int'l Symp. on Comp. Science and Computational Tech., 2008
, pp. 3-6
-
-
Lang, W.-M.1
Wu, R.-S.2
Wang, J.-Q.3
-
7
-
-
38049024684
-
An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions
-
T. Enokido, L. Barolli, and M. Takizawa (Eds.)
-
T.Shon and W.Choi, "An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions", T. Enokido, L. Barolli, and M. Takizawa (Eds.): LNCS 4658, 2007, pp. 88-97.
-
(2007)
LNCS
, vol.4658
, pp. 88-97
-
-
Shon, T.1
Choi, W.2
-
9
-
-
62949117516
-
An Improved Mutual Authentication Scheme in Multi-Hop WiMax Network
-
H.Jin, L.Tu, G.Yang and Y.Yang, "An Improved Mutual Authentication Scheme in Multi-Hop WiMax Network," Proc. of Int'l Conf. on Comp. and Electrical Engg., 2008, pp. 296-299.
-
Proc. of Int'l Conf. on Comp. and Electrical Engg., 2008
, pp. 296-299
-
-
Jin, H.1
Tu, L.2
Yang, G.3
Yang, Y.4
-
13
-
-
47949100952
-
Mobile WiMAX for networks with enhanced security and reliability requirements
-
O.Kyas, "Mobile WiMAX for networks with enhanced security and reliability requirements," Proc. of Military Comm. Conf., 2007, pp. 1-4.
-
Proc. of Military Comm. Conf., 2007
, pp. 1-4
-
-
Kyas, O.1
-
15
-
-
3042685819
-
Overview of IEEE 802.16 Security
-
D.Johnston and J.Walker, "Overview of IEEE 802.16 Security," IEEE Security and Privacy Mag., 2004, vol.2, issue 3, pp. 40-48.
-
(2004)
IEEE Security and Privacy Mag.
, vol.2
, Issue.3
, pp. 40-48
-
-
Johnston, D.1
Walker, J.2
-
17
-
-
48649097813
-
Secure and fast handover scheme based on pre- Authentication method for 802.16-WiMAX
-
H-M.Sun, Y-H.Lin, S-M.Chen and Y-C.Shen; "Secure and fast handover scheme based on pre- authentication method for 802.16-WiMAX," Proc. of IEEE Region of 10 Conf., 2007, pp. 1-4.
-
Proc. of IEEE Region of 10 Conf., 2007
, pp. 1-4
-
-
Sun, H.-M.1
Lin, Y.-H.2
Chen, S.-M.3
Shen, Y.-C.4
-
18
-
-
38549178532
-
Security Analysis of IEEE 802.16, Communications
-
L.Maccari, M.Paoli and R.Fantacci, "Security Analysis of IEEE 802.16, Communications," Proc. of Int'l Conf. on Comm., 2007, pp. 1160-1165.
-
Proc. of Int'l Conf. on Comm., 2007
, pp. 1160-1165
-
-
Maccari, L.1
Paoli, M.2
Fantacci, R.3
-
19
-
-
51649125749
-
Security Considerations for Handover Schemes in Mobile WiMAX Networks
-
J.Hur, H.Shim, P.Kim, H.Yoon and N-O.Song, "Security Considerations for Handover Schemes in Mobile WiMAX Networks," Proc. of Int'l Conf. on Wireless Comm. and Networking, 2008, pp. 2531-2536.
-
Proc. of Int'l Conf. on Wireless Comm. and Networking, 2008
, pp. 2531-2536
-
-
Hur, J.1
Shim, H.2
Kim, P.3
Yoon, H.4
Song, N.-O.5
-
20
-
-
34248381676
-
Security Issues in Privacy and Key Management Protocols of IEEE 802.16
-
S.Xu, M.Matthews and C-T.Huang, "Security Issues in Privacy and Key Management Protocols of IEEE 802.16," Proc. of ACM 44th Annual Southeast Regional Conf., 2006, pp. 113-118.
-
Proc. of ACM 44th Annual Southeast Regional Conf., 2006
, pp. 113-118
-
-
Xu, S.1
Matthews, M.2
Huang, C.-T.3
-
25
-
-
77952693424
-
A WPKI-based Security Mechanism for IEEE 802.16e, IEEE Communications Society
-
F.Liu and L.Lu, "A WPKI-based Security Mechanism for IEEE 802.16e, IEEE Communications Society," Proc. of Int'l Conference on Wireless Comm., Networking and Mobile Computing, 2006, pp. 1-4.
-
Proc. of Int'l Conference on Wireless Comm., Networking and Mobile Computing, 2006
, pp. 1-4
-
-
Liu, F.1
Lu, L.2
-
28
-
-
38549178532
-
Security analysis of IEEE 802.16
-
L.Maccari, M.Paoli and R.Fantacci, "Security analysis of IEEE 802.16," Proc. of IEEE Int'l Conf. on Comm., 2007, pp. 1160-1165.
-
Proc. of IEEE Int'l Conf. on Comm., 2007
, pp. 1160-1165
-
-
Maccari, L.1
Paoli, M.2
Fantacci, R.3
-
31
-
-
33646904325
-
An improved security scheme in WMAN based on IEEE standard 802.16
-
F.Yang, H.Zhou, L.Zhang and J.Feng, "An improved security scheme in WMAN based on IEEE standard 802.16," Proc. of Int'l Conf. on Wireless Comm. Networking & Mobile Computing, 2005, pp.1191-1194.
-
Proc. of Int'l Conf. on Wireless Comm. Networking & Mobile Computing, 2005
, pp. 1191-1194
-
-
Yang, F.1
Zhou, H.2
Zhang, L.3
Feng, J.4
|