-
1
-
-
0012539576
-
IP Mobility Support for IPv4
-
C. Perkins, “IP Mobility Support for IPv4,” IETF RFC 3344, 2002.
-
(2002)
IETF RFC
, pp. 3344
-
-
Perkins, C.1
-
3
-
-
85024537058
-
-
Neuman: J. L Schiller, and J.H. Saltzer, “Kerberos Authentication and Authorization System,” MIT Project Athena Technical Document
-
S.P. Miller, B. C. Neuman, J. L Schiller, and J.H. Saltzer, “Kerberos Authentication and Authorization System,” MIT Project Athena Technical Document, 1988.
-
(1988)
B. C
-
-
Miller, S.P.1
-
5
-
-
0003237987
-
The Kerberos Network Authentication Service (Version 5)
-
J. Kohl and B. C. Neuman, “The Kerberos Network Authentication Service (Version 5),” IETF RFC 1510, 1993.
-
(1993)
IETF RFC
, pp. 1510
-
-
Kohl, J.1
Neuman, B.C.2
-
6
-
-
0028514601
-
Kerberos: An Authentication Service for Computer Networks
-
B. C. Neuman and T. Ts’o. “Kerberos:An Authentication Service for Computer Networks,” IEEE Communications Magazine, vol. 32, pp. 33–38, 1994.
-
(1994)
IEEE Communications Magazine
, vol.32
, pp. 33-38
-
-
Neuman, B.C.1
Ts’o, T.2
-
7
-
-
85024534926
-
Jacobs and S. Belgard, “Mobile IP Public Key Based Authentication,” draft jacobsmobileip-pki-auth-03.txt
-
S. Jacobs and S. Belgard, “Mobile IP Public Key Based Authentication,” draft jacobsmobileip-pki-auth-03.txt, IETF Internet-Draft, 2001.
-
(2001)
IETF Internet-Draft
-
-
-
8
-
-
0003329392
-
Mobile IP Authentication, Authorization, and Accounting Requirements
-
S. Glass, T. Hiller, S. Jacobs, C. Perkins, “Mobile IP Authentication, Authorization, and Accounting Requirements,” IETF RFC 2977, 2000.
-
(2000)
IETF RFC
, pp. 2977
-
-
Glass, S.1
Hiller, T.2
Jacobs, S.3
Perkins, C.4
-
9
-
-
28044472621
-
Authentication, Authorization, and Accounting (AAA) Registration Keys for Mobile IPv4
-
C. Perkins and P. Calhoun, “Authentication, Authorization, and Accounting (AAA) Registration Keys for Mobile IPv4,” IETF RFC 3957, 2005.
-
(2005)
IETF RFC
, pp. 3957
-
-
Perkins, C.1
Calhoun, P.2
-
11
-
-
18144405252
-
An Access Control Protocol, Sometimes Called TACACS
-
C. Finseth, “An Access Control Protocol, Sometimes Called TACACS,” IETF RFC 1492, 1993.
-
(1993)
IETF RFC
, pp. 1492
-
-
Finseth, C.1
-
13
-
-
0003218526
-
Simpson, “Remote Authentication Dial In User Service (RADIUS)
-
C. Rigney, S. Willens, A. Rubens, and W. Simpson, “Remote Authentication Dial In User Service (RADIUS), IETF RFC 2865, 2000.
-
(2000)
IETF RFC
, pp. 2865
-
-
Rigney, C.1
Willens, S.2
Rubens, A.3
-
14
-
-
77951694844
-
Common Remote Authentication Dial In User Service (RADIUS) Implementation Issues and Suggested Fixes
-
D. Nelson and A. DeKok, “Common Remote Authentication Dial In User Service (RADIUS) Implementation Issues and Suggested Fixes,” IETF RFC 5080, 2007.
-
(2007)
IETF RFC
, pp. 5080
-
-
Nelson, D.1
DeKok, A.2
-
15
-
-
85024593945
-
-
IETFAuthentication,Authorization,and Accounting Working Group, Accessed on June 2008.
-
IETFAuthentication,Authorization,and Accounting Working Group, http://www.ietf.org/html.charters/OLD/aaa-charter.html, Accessed on June 2008.
-
-
-
-
16
-
-
2942667311
-
Diameter Base Protocol
-
P. Calhoun, J. Loughney, E. Guttman, G. Zorn, and J. Arkko, “Diameter Base Protocol,” IETF RFC 3588, 2003.
-
(2003)
IETF RFC
, pp. 3588
-
-
Calhoun, P.1
Loughney, J.2
Guttman, E.3
Zorn, G.4
Arkko, J.5
-
17
-
-
0042095218
-
Mobile IPv4 Challenge/Response Extensions
-
C. Perkins and P. Calhoun, “Mobile IPv4 Challenge/Response Extensions,” IETF RFC 3012, 2000.
-
(2000)
IETF RFC
, pp. 3012
-
-
Perkins, C.1
Calhoun, P.2
-
18
-
-
70350247806
-
Mobile IPv4 Challenge/Response Extensions (Revised)
-
C. Perkins, P. Calhoun, and J. Bharatia, “Mobile IPv4 Challenge/Response Extensions (Revised),” IETF RFC 4721, 2007.
-
(2007)
IETF RFC
, pp. 4721
-
-
Perkins, C.1
Calhoun, P.2
Bharatia, J.3
-
19
-
-
0003301709
-
Mobile IP Network Access Identifier Extension for IPv4
-
P. Calhoun, C. Perkins, “Mobile IP Network Access Identifier Extension for IPv4,” IETF RFC 2794, 2000.
-
(2000)
IETF RFC
, pp. 2794
-
-
Calhoun, P.1
Perkins, C.2
-
20
-
-
0003196107
-
HMAC: Keyed-Hashing for Message Authentication
-
H. Krawczyk, M. Bellare, and R. Canetti, “HMAC:Keyed-Hashing for Message Authentication,” IETF RFC 2104, 1997.
-
(1997)
IETF RFC
, pp. 2104
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
21
-
-
85024567623
-
Nakhjiri, M. Parthasarathy, J. Bournelle, H. Tschofenig, and R Marin Lopez, “AAA based Keying for Wireless Handovers: Problem Statement,” draft-nakhjiri-aaa-hokey-ps03
-
M. Nakhjiri, M. Parthasarathy, J. Bournelle, H. Tschofenig, and R Marin Lopez, “AAA based Keying for Wireless Handovers:Problem Statement,” draft-nakhjiri-aaa-hokey-ps03, IETF Internet-Draft (expired), 2006.
-
(2006)
IETF Internet-Draft (expired)
-
-
-
22
-
-
0032643561
-
An Efficient Authentication Protocol for Mobile Networks
-
S. Shieh, F. Ho, and Y. Huang, “An Efficient Authentication Protocol for Mobile Networks,” Journal of Information Science and Engineering, vol. 15, no. 4, pp. 505–520, 1999.
-
(1999)
Journal of Information Science and Engineering
, vol.15
, Issue.4
, pp. 505-520
-
-
Shieh, S.1
Ho, F.2
Huang, Y.3
-
23
-
-
65249110324
-
Shall we apply paging technologies to Proxy Mobile IPv6 ?
-
J.-H. Lee, T.-M. Chung, S. Pack, and S. Gundavelli, “Shall we apply paging technologies to Proxy Mobile IPv6 ?,” In Proceedings of ACM International Workshop on Mobility in the EvolvinglnternetArchitecture (MobiArch) 2008, 2008.
-
(2008)
In Proceedings of ACM International Workshop on Mobility in the EvolvinglnternetArchitecture (MobiArch)
, pp. 2008
-
-
Lee, J.-H.1
Chung, T.-M.2
Pack, S.3
Gundavelli, S.4
-
24
-
-
58149094777
-
Localized Proxy-MIPv6 with Route Optimization in IPBased Networks
-
S. Park, N. Kang, and Y. Kim, “Localized Proxy-MIPv6 with Route Optimization in IPBased Networks,” IEICE Transactions on Communications, vol. E90-H, no. 12, 2007.
-
(2007)
IEICE Transactions on Communications, vol. E90-H, no.
, pp. 12
-
-
Park, S.1
Kang, N.2
Kim, Y.3
-
25
-
-
25144482399
-
Forwarding Scheme Extension for Fast and Secure Handoff in Hierarchical MIPv6
-
H. Jeon, J. Lim, H. Choo, and G.-L. Park, “Forwarding Scheme Extension for Fast and Secure Handoff in Hierarchical MIPv6,” In Proceedings of International Conference on Computational Science (ICCS) 2005, pp. 468–476, 2005.
-
(2005)
In Proceedings of International Conference on Computational Science (ICCS)
, vol.2005
, pp. 468-476
-
-
Jeon, H.1
Lim, J.2
Choo, H.3
Park, G.-L.4
-
26
-
-
0033876523
-
An inter-system handoff technique for the IMT-2000 system
-
J. McNair, LF. Akyldiz, and M.D. Bender, “An inter-system handoff technique for the IMT-2000 system,” In Proceedings of IEEE INFOCOM 2000, pp. 203–216, 2000.
-
(2000)
In Proceedings of IEEE INFOCOM
, vol.2000
, pp. 203-216
-
-
McNair, J.1
Akyldiz, L.F.2
Bender, M.D.3
-
29
-
-
4544274584
-
Hybrid Multilayer Mobility Management with AAA Context Transfer Capabilities for All-IP Networks
-
C. Politis, K A. Chew, N. Akhtar, M. Georgiades, and R. Tafazolli, “Hybrid Multilayer Mobility Management with AAA Context Transfer Capabilities for All-IP Networks,” IEEE Wireless Communications, vol. 11, pp. 76–88, 2004.
-
(2004)
IEEE Wireless Communications
, vol.11
, pp. 76-88
-
-
Politis, C.1
Chew, K.A.2
Akhtar, N.3
Georgiades, M.4
Tafazolli, R.5
-
30
-
-
21444457797
-
Secure Session Key Exchange for Mobile IP Low Latency Handoff
-
H.-G. Kim, D. H. Choi, and D. Y. Kim, “Secure Session Key Exchange for Mobile IP Low Latency Handoff,” In Proceedings of International Conference on Computational Science and its Applications (ICCSA) 2003, pp. 230–238, 2003.
-
(2003)
In Proceedings of International Conference on Computational Science and its Applications (ICCSA)
, vol.2003
, pp. 230-238
-
-
Kim, H.-G.1
Choi, D.H.2
Kim, D.Y.3
|