-
1
-
-
6344241336
-
Mobility support in IPv6
-
Montreal, QC, Canada, RFC, Jun.
-
D. Johnson and J. Arkko, "Mobility support in IPv6," Internet Eng. Task Force, Montreal, QC, Canada, RFC 3775, Jun. 2004.
-
(2004)
Internet Eng. Task Force
, vol.3775
-
-
Johnson, D.1
Arkko, J.2
-
2
-
-
33645626800
-
Network mobility basic support protocol
-
Montreal, QC, Canada, RFC, Jan.
-
V. Devarapalli, R. Wakikawa, A. Petrescu, and P. Thubert, "Network mobility basic support protocol," Internet Eng. Task Force, Montreal, QC, Canada, RFC 3963, Jan. 2005.
-
(2005)
Internet Eng. Task Force
, vol.3963
-
-
Devarapalli, V.1
Wakikawa, R.2
Petrescu, A.3
Thubert, P.4
-
3
-
-
67650699965
-
Network mobility support terminology
-
Montreal, QC, Canada, RFC, Jul.
-
T. Ernst and H. Lach, "Network mobility support terminology," Internet Eng. Task Force, Montreal, QC, Canada, RFC 4885, Jul. 2007.
-
(2007)
Internet Eng. Task Force
, vol.4885
-
-
Ernst, T.1
Lach, H.2
-
4
-
-
0003329392
-
Mobile IP authentication, authorization, and accounting requirements
-
Montreal, QC, Canada, RFC Oct.
-
S. Glass, T. Hiller, S. Jacobs, and C. Perkins, "Mobile IP authentication, authorization, and accounting requirements," Internet Eng. Task Force, Montreal, QC, Canada, RFC 2977, Oct. 2000.
-
(2000)
Internet Eng. Task Force
, vol.2977
-
-
Glass, S.1
Hiller, T.2
Jacobs, S.3
Perkins, C.4
-
5
-
-
0034238640
-
Mobile IP joins forces with AAA
-
Aug.
-
C. Perkins, "Mobile IP joins forces with AAA," IEEE Pers. Commun., vol. 7, no. 4, pp. 59-61, Aug. 2000.
-
(2000)
IEEE Pers. Commun.
, vol.7
, Issue.4
, pp. 59-61
-
-
Perkins, C.1
-
6
-
-
33748592366
-
Authentication access for IPv6 supported mobility
-
P. Engelstad, T. Halselstad, and F. Paint, "Authentication access for IPv6 supported mobility," in Proc. ISCC, 2003, pp. 569-575.
-
(2003)
Proc. ISCC
, pp. 569-575
-
-
Engelstad, P.1
Halselstad, T.2
Paint, F.3
-
7
-
-
76949097151
-
Mobile IP and WLAN with AAA authentication protocol using identity-based cryptography
-
B. Lee, D. Choi, H. Kim, S. Sohn, and K. Park, "Mobile IP and WLAN with AAA authentication protocol using identity-based cryptography," in Proc. ICT, 2003, pp. 597-603.
-
(2003)
Proc. ICT
, pp. 597-603
-
-
Lee, B.1
Choi, D.2
Kim, H.3
Sohn, S.4
Park, K.5
-
8
-
-
80052827331
-
Single sign-on framework for AAA operations within commercial mobile network
-
Apr.
-
S. Zrelli and Y. Shinoda, "Single sign-on framework for AAA operations within commercial mobile network," in Proc. 1st ARES, Apr. 2006, pp. 1-8.
-
(2006)
Proc. 1st ARES
, pp. 1-8
-
-
Zrelli, S.1
Shinoda, Y.2
-
9
-
-
37649028297
-
A proactive authentication integration for the network mobility
-
D. Binet, A. Martin, and B. Gaabab, "A proactive authentication integration for the network mobility," in Proc. 3rd ICWMC, 2007, p. 53.
-
(2007)
Proc. 3rd ICWMC
, pp. 53
-
-
Binet, D.1
Martin, A.2
Gaabab, B.3
-
10
-
-
0003535506
-
Remote authentication dial in user service
-
Montreal, QC, Canada, Tech. Rep. RFC 2865, Jun.
-
C. Rigney, A. Rubens, W. Simpson, and S. Willens, "Remote authentication dial in user service," Internet Eng. Task Force, Montreal, QC, Canada, Tech. Rep. RFC 2865, Jun. 2000.
-
(2000)
Internet Eng. Task Force
-
-
Rigney, C.1
Rubens, A.2
Simpson, W.3
Willens, S.4
-
11
-
-
6344233247
-
Extensible authentication protocol
-
Montreal, QC, Canada, RFC 3748,Jun.
-
B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, and H. Levkowetz, "Extensible authentication protocol," Internet Eng. Task Force, Montreal, QC, Canada, RFC 3748, Jun. 2004.
-
(2004)
Internet Eng. Task Force
-
-
Aboba, B.1
Blunk, L.2
Vollbrecht, J.3
Carlson, J.4
Levkowetz, H.5
-
12
-
-
0003899069
-
The EAP-TLS authentication protocol
-
Montreal, QC, Canada, RFC 5216, Mar.
-
D. Simon, B. Aboba, and R. Hurst, "The EAP-TLS authentication protocol," Internet Eng. Task Force, Montreal, QC, Canada, RFC 5216, Mar. 2008.
-
(2008)
Internet Eng. Task Force
-
-
Simon, D.1
Aboba, B.2
Hurst, R.3
-
13
-
-
33748606726
-
Protocol for carrying authentication for network access (PANA)
-
Montreal, QC, Canada, RFC 5191, May
-
D. Forsberg, Y. Ohba, B. Patil, and H. Tschofenig, "Protocol for carrying authentication for network access (PANA)," Internet Eng. Task Force, Montreal, QC, Canada, RFC 5191, May 2008.
-
(2008)
Internet Eng. Task Force
-
-
Forsberg, D.1
Ohba, Y.2
Patil, B.3
Tschofenig, H.4
-
14
-
-
0004282359
-
Diameter base protocol
-
Montreal, QC, Canada, RFC 3588, Sep.
-
P. Calhoun and J. Arkko, "Diameter base protocol," Internet Eng. Task Force, Montreal, QC, Canada, RFC 3588, Sep. 2003.
-
(2003)
Internet Eng. Task Force
-
-
Calhoun, P.1
Arkko, J.2
-
15
-
-
0003899818
-
The Kerberos network authentication service (V5)
-
Montreal, QC, Canada, RFC 4120, Jul.
-
C. Neuman, T. Yu, S. Hartman, and K. Raeburn, "The Kerberos network authentication service (V5)," Internet Eng. Task Force, Montreal, QC, Canada, RFC 4120, Jul. 2005.
-
(2005)
Internet Eng. Task Force
-
-
Neuman, C.1
Yu, T.2
Hartman, S.3
Raeburn, K.4
-
16
-
-
34247359595
-
RADIUS support for EAP
-
Montreal, QC, Canada, RFC, 3579, Jun.
-
B. Aboba and P. Calhoun, "RADIUS support for EAP," Internet Eng. Task Force, Montreal, QC, Canada, RFC 3579, Jun. 2003.
-
(2003)
Internet Eng. Task Force
-
-
Aboba, B.1
Calhoun, P.2
-
17
-
-
33750416464
-
Diameter extensible authentication protocol (EAP) application
-
Montreal, QC, Canada, RFC 4072, Aug.
-
P. Eronen, T. Hiller, and G. Zorn, "Diameter extensible authentication protocol (EAP) application," Internet Eng. Task Force, Montreal, QC, Canada, RFC 4072, Aug. 2005.
-
(2005)
Internet Eng. Task Force
-
-
Eronen, P.1
Hiller, T.2
Zorn, G.3
-
18
-
-
80052833270
-
Connecting automobiles to the Internet
-
Seoul, Korea, Nov.
-
T. Ernst and K. Uehara, "Connecting automobiles to the Internet," in Proc. 3rd Int. Workshop ITST, Seoul, Korea, Nov. 2002, pp. 1-6.
-
(2002)
Proc. 3rd Int. Workshop ITST
, pp. 1-6
-
-
Ernst, T.1
Uehara, K.2
-
20
-
-
80052824836
-
MANEMO problem statement
-
Feb.
-
R. Wakikawa, P. Thubert, J. Bound, and B. McCarthy, "MANEMO Problem Statement," Internet Eng. Task Force draft (expired), Feb. 2007.
-
(2007)
Internet Eng. Task Force draft (expired)
-
-
Wakikawa, R.1
Thubert, P.2
Bound, J.3
McCarthy, B.4
-
22
-
-
38049167992
-
-
Dec. Internet Eng. Task Force Internet draft (expired). [Online]. Available
-
C. Ng and T. Tanaka, Usage Scenario and Requirements for AAA in Network Mobility Support, Dec. 2002. Internet Eng. Task Force Internet draft (expired). [Online]. Available: http://www.mobilenetworks.org/ nemo/drafts/draft-ng-nemo- aaa-use-00.txt
-
(2002)
Usage Scenario and Requirements for AAA in Network Mobility Support
-
-
Ng, C.1
Tanaka, T.2
-
23
-
-
80052853468
-
Access control architecture for nested mobile environments in IPv6
-
Jun.
-
S. Zrelli, T. Ernst, and D. Binet, "Access control architecture for nested mobile environments in IPv6," in Proc. 4th CSNA, Jun. 2005, pp. 1-11.
-
(2005)
Proc. 4th CSNA
, pp. 1-11
-
-
Zrelli, S.1
Ernst, T.2
Binet, D.3
-
24
-
-
80052853957
-
AAA considerations within several NEMO deployment scenarios
-
Jan.
-
J. Bournelle, G. Valadon, D. Binet, S. Zrelli, and J. Combes, "AAA considerations within several NEMO deployment scenarios," in Proc. Workshop Netw. Mobility, Jan. 2006, pp. 1-10.
-
(2006)
Proc. Workshop Netw. Mobility
, pp. 1-10
-
-
Bournelle, J.1
Valadon, G.2
Binet, D.3
Zrelli, S.4
Combes, J.5
-
25
-
-
7244236291
-
Localized authentication for internetwork roaming across wireless LANs
-
Oct.
-
M. Long, C. Wu, and J. D. Irwin, "Localized authentication for internetwork roaming across wireless LANs," Proc. Inst. Elect. Eng. Commun., vol. 151, no. 5, pp. 496-500, Oct. 2004.
-
(2004)
Proc. Inst. Elect. Eng. Commun.
, vol.151
, Issue.5
, pp. 496-500
-
-
Long, M.1
Wu, C.2
Irwin, J.D.3
-
26
-
-
0002885224
-
Prudent engineering practice for cryptographic protocols
-
Jan.
-
M. Abadi and R. Needham, "Prudent engineering practice for cryptographic protocols," IEEE Trans. Softw. Eng., vol. 22, no. 1, pp. 6-15, Jan. 1996.
-
(1996)
IEEE Trans. Softw. Eng.
, vol.22
, Issue.1
, pp. 6-15
-
-
Abadi, M.1
Needham, R.2
-
29
-
-
0038052870
-
Improving mobile authentication with new AAA protocols
-
May
-
H. Kim and H. Afifi, "Improving mobile authentication with new AAA protocols," in Proc. Commun., May 2003, pp. 497-501.
-
(2003)
Proc. Commun.
, pp. 497-501
-
-
Kim, H.1
Afifi, H.2
-
30
-
-
0031257939
-
An authentication technique based on distributed security management for the global mobility network
-
Oct.
-
S. Suzuki and K. Nakada, "An authentication technique based on distributed security management for the global mobility network," IEEE J. Sel. Areas Commun., vol. 15, no. 8, pp. 1608-1617, Oct. 1997.
-
(1997)
IEEE J. Sel. Areas Commun.
, vol.15
, Issue.8
, pp. 1608-1617
-
-
Suzuki, S.1
Nakada, K.2
-
31
-
-
3042783229
-
A self-encryptionmechanism for authentication of roaming and teleconference services
-
Mar.
-
K. Hwang and C. Chang, "A self-encryptionmechanism for authentication of roaming and teleconference services," IEEE Trans. Wireless Commun., vol. 2, no. 2, pp. 400-407, Mar. 2003.
-
(2003)
IEEE Trans. Wireless Commun.
, vol.2
, Issue.2
, pp. 400-407
-
-
Hwang, K.1
Chang, C.2
-
32
-
-
80052851772
-
-
Apr. [Online]. Available
-
Wikipedia, Replay Attack, Apr. 2009. [Online]. Available: http://en. wikipedia.org/wiki/Replay-attack
-
(2009)
Wikipedia Replay Attack
-
-
-
33
-
-
0003729341
-
HMAC: Keyed-hashing for message authentication
-
Montreal, QC, Canada, RFC, 2104, Feb.
-
H. Krawczyk, M. Bellare, and R. Canetti, "HMAC: Keyed-hashing for message authentication," Internet Eng. Task Force, Montreal, QC, Canada, RFC 2104, Feb. 1997.
-
(1997)
Internet Eng. Task Force
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
34
-
-
0003508558
-
-
Federal Information Processing Standard Publication 197, Nov.
-
Advanced Encryption Standard, Federal Information Processing Standard Publication 197, Nov. 2001.
-
(2001)
Advanced Encryption Standard
-
-
-
35
-
-
33748582923
-
LR-AKE-based AAA for network mobility (NEMO) over wireless links
-
Sep.
-
H. Fathi, S. Shin, K. Kobara, S. Chakraborty, H. Imai, and R. Prasad, "LR-AKE-based AAA for network mobility (NEMO) over wireless links," IEEE J. Sel. Areas Commun., vol. 24, no. 9, pp. 1725-1737, Sep. 2006.
-
(2006)
IEEE J. Sel. Areas Commun.
, vol.24
, Issue.9
, pp. 1725-1737
-
-
Fathi, H.1
Shin, S.2
Kobara, K.3
Chakraborty, S.4
Imai, H.5
Prasad, R.6
-
36
-
-
33645352668
-
Generic AAA architecture
-
Montreal, QC, Canada, RFC, 2903, Aug.
-
C. de Laat, G. Gross, L. Gommans, J. Vollbrecht, and D. Spence, "Generic AAA architecture," Internet Eng. Task Force, Montreal, QC, Canada, RFC 2903, Aug. 2000.
-
(2000)
Internet Eng. Task Force
-
-
De Laat, C.1
Gross, G.2
Gommans, L.3
Vollbrecht, J.4
Spence, D.5
-
37
-
-
0000523051
-
A logic of authentication
-
Dec.
-
M. Burrows, "A logic of authentication," Proc. R. Soc. Lond. A, vol. 426, no. 1871, pp. 233-271, Dec. 1989.
-
(1989)
Proc. R. Soc. Lond. A
, vol.426
, Issue.1871
, pp. 233-271
-
-
Burrows, M.1
-
38
-
-
0012091823
-
Performance Evaluation of AAA/mobile IP authentication
-
Tech. Univ. Berlin, Berlin, Germany, Aug. [Online]. Available:
-
A. Hess and G. Schafer, "Performance Evaluation of AAA/mobile IP authentication," Tech. Rep. TKN-01-012, Tech. Univ. Berlin, Berlin, Germany, Aug. 2001. [Online]. Available: http://www-tkn.ee.tu-berlin.de/ publications/papers/tkn01-012.pdf
-
(2001)
Tech. Rep. TKN-01-012
-
-
Hess, A.1
Schafer, G.2
-
39
-
-
47349109540
-
Secure AAA and mobility for nested mobile networks
-
H. Fathi, S. Shin, K. Kobara, and H. Imai, "Secure AAA and mobility for nested mobile networks," in Proc. 7th ITST, 2007, pp. 1-6.
-
(2007)
Proc. 7th ITST
, pp. 1-6
-
-
Fathi, H.1
Shin, S.2
Kobara, K.3
Imai, H.4
-
40
-
-
70350506360
-
Route optimization in nested NEMO: Classification, evaluation and analysis from NEMO fringe stub perspective
-
Nov.
-
H.-J. Lim, M. Kim, J.-H. Lee, and T. Chung, "Route optimization in nested NEMO: Classification, evaluation and analysis from NEMO fringe stub perspective," IEEE Trans. Mobile Comput., vol. 8, no. 11, pp. 1554-1572, Nov. 2009.
-
(2009)
IEEE Trans. Mobile Comput.
, vol.8
, Issue.11
, pp. 1554-1572
-
-
Lim, H.-J.1
Kim, M.2
Lee, J.-H.3
Chung, T.4
-
41
-
-
80052860470
-
-
Ph.D. dissertation, Sch. Elect. Eng. Comput. Sci., Seoul Nat. Univ., Seoul, Korea, Aug.
-
E. Paik, "Performance enhancement for IPv6 network mobility," Ph.D. dissertation, Sch. Elect. Eng. Comput. Sci., Seoul Nat. Univ., Seoul, Korea, Aug. 2004.
-
(2004)
Performance Enhancement for IPv6 Network Mobility
-
-
Paik, E.1
-
42
-
-
80052832130
-
Configuration and provisioning for wireless access points problem statement
-
Montreal, QC, Canada, RFC 3990, Feb.
-
B. OHara, P. Calhoun, and J. Kempf, "Configuration and provisioning for wireless access points problem statement," Internet Eng. Task Force, Montreal, QC, Canada, RFC 3990, Feb. 2005.
-
(2005)
Internet Eng. Task Force
-
-
Ohara, B.1
Calhoun, P.2
Kempf, J.3
-
43
-
-
80052853470
-
Handover key management and re-authentication problem statement
-
Montreal, QC, Canada, RFC, 5169, Mar.
-
T. Clancy, M. Nakhjiri, V. Narayanan, and L. Dondeti, "Handover key management and re-authentication problem statement," Internet Eng. Task Force, Montreal, QC, Canada, RFC 5169, Mar. 2008.
-
(2008)
Internet Eng. Task Force
-
-
Clancy, T.1
Nakhjiri, M.2
Narayanan, V.3
Dondeti, L.4
-
45
-
-
64249114541
-
A PK-SIM card based end-to-end security framework for SMS
-
Jun.
-
H. Rongyu, Z. Guolei, C. Chaowen, X. Hui, Q. Xi, and Q. Zheng, "A PK-SIM card based end-to-end security framework for SMS," Comput. Standards Interfaces, vol. 31, no. 4, pp. 629-641, Jun. 2009.
-
(2009)
Comput. Standards Interfaces
, vol.31
, Issue.4
, pp. 629-641
-
-
Rongyu, H.1
Guolei, Z.2
Chaowen, C.3
Hui, X.4
Xi, Q.5
Zheng, Q.6
-
46
-
-
34548790759
-
Provably efficient authenticated key agreement protocol for multi-servers
-
R. Hwang and S. Shiau, "Provably efficient authenticated key agreement protocol for multi-servers," Comput. J., vol. 50, no. 5, pp. 602-615, 2007.
-
(2007)
Comput. J.
, vol.50
, Issue.5
, pp. 602-615
-
-
Hwang, R.1
Shiau, S.2
-
48
-
-
70450285606
-
Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics
-
Dec.
-
C. Fan and Y. Lin, "Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics," IEEE Trans. Inf. Forensics Security, vol. 4, no. 4, pp. 933-945, Dec. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.4
, pp. 933-945
-
-
Fan, C.1
Lin, Y.2
-
49
-
-
51049122345
-
Internet X.509 public key infrastructure certificate and Certificate Revocation List (CRL) profile
-
Montreal, QC, Canada, RFC 5280, May
-
D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk, "Internet X.509 public key infrastructure certificate and Certificate Revocation List (CRL) profile," Internet Eng. Task Force, Montreal, QC, Canada, RFC 5280, May 2008.
-
(2008)
Internet Eng. Task Force
-
-
Cooper, D.1
Santesson, S.2
Farrell, S.3
Boeyen, S.4
Housley, R.5
Polk, W.6
-
50
-
-
79951988429
-
Secure handover for proxy mobile IPv6 in next-generation communications: Scenarios and performance
-
Feb.
-
J.-H. Lee and T.-M. Chung, "Secure handover for proxy mobile IPv6 in next-generation communications: Scenarios and performance," Wireless Commun. Mobile Comput., vol. 11, no. 2, pp. 176-186, Feb. 2011.
-
(2011)
Wireless Commun. Mobile Comput.
, vol.11
, Issue.2
, pp. 176-186
-
-
Lee, J.-H.1
Chung, T.-M.2
-
51
-
-
33751508709
-
Recommendation for key management
-
Gaithersburg, MD, Spec. Pub. 800-57, Mar.
-
E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid, "Recommendation for key management," Nat. Inst. Standards Technol., Gaithersburg, MD, Spec. Pub. 800-57, Mar. 2007.
-
(2007)
Nat. Inst. Standards Technol.
-
-
Barker, E.1
Barker, W.2
Burr, W.3
Polk, W.4
Smid, M.5
|