-
2
-
-
67349139858
-
LTE: The evolution of mobile broadband
-
D. Astely, E. Dahlman, A. Furuskar, Y. Jading, M. Lindstrom, and S. Parkvall LTE: the evolution of mobile broadband IEEE Communications Magazine 47 4 2009 44 51
-
(2009)
IEEE Communications Magazine
, vol.47
, Issue.4
, pp. 44-51
-
-
Astely, D.1
Dahlman, E.2
Furuskar, A.3
Jading, Y.4
Lindstrom, M.5
Parkvall, S.6
-
3
-
-
84882949638
-
-
3rd Generation Partnership Project Security of H(e)NB; (Rel 8), 3GPP TR 33.820 V8.3.0, November
-
3rd Generation Partnership Project; Technical Specification Group Service and System Aspects; Security of H(e)NB; (Rel 8), 3GPP TR 33.820 V8.3.0, November 2009.
-
(2009)
Technical Specification Group Service and System Aspects
-
-
-
4
-
-
77951611425
-
Building Femtocell More Secure with Improved Proxy Signature
-
C.K. Han, H.K. Choi, and I.H. Kim, Building Femtocell More Secure with Improved Proxy Signature, in Proceedings of IEEE GLOBECOM 2009, USA, December 2009, pp. 1-6.
-
(2009)
Proceedings of IEEE GLOBECOM 2009, USA, December
, pp. 1-6
-
-
Han, C.K.1
Choi, H.K.2
Kim, I.H.3
-
5
-
-
78651315424
-
-
3rd Generation Partnership Project; Technical Specification Group Service and System Aspects 3GPP TS 33.401 V11.0.1, June
-
3rd Generation Partnership Project; Technical Specification Group Service and System Aspects; 3GPP System Architecture Evolution (SAE); Security architecture (Rel 11) 3GPP TS 33.401 V11.0.1, June 2011.
-
(2011)
3GPP System Architecture Evolution (SAE); Security Architecture (Rel 11)
-
-
-
8
-
-
77956175764
-
LTE key management analysis with session keys context
-
D. Forsberg LTE key management analysis with session keys context Computer Communications 33 16 2010 907 1915
-
(2010)
Computer Communications
, vol.33
, Issue.16
, pp. 907-1915
-
-
Forsberg, D.1
-
10
-
-
84949157260
-
An Authentication Scheme for Fast Handover between WiFi Access Points
-
A. Bohk, L. Buttyn, L. Dra, An Authentication Scheme for Fast Handover between WiFi Access Points, in: Proceeding of ACM Wireless Internet Conference (WICON 2007), October 2007, pp. 22-24.
-
(2007)
Proceeding of ACM Wireless Internet Conference (WICON 2007), October
, pp. 22-24
-
-
Bohk, A.1
Buttyn, L.2
Dra, L.3
-
11
-
-
1842665111
-
Proactive key distribution using neighbor graphs
-
A. Mishra, M.H. Shin, N.L. Petroni Jr., T.C. Clancy, and W.A. Arbaugh Proactive key distribution using neighbor graphs IEEE Wireless Communications 11 1 2004 26 36
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.1
, pp. 26-36
-
-
Mishra, A.1
Shin, M.H.2
Petroni, Jr.N.L.3
Clancy, T.C.4
Arbaugh, W.A.5
-
12
-
-
26444494997
-
An empirical analysis of the IEEE 802.11 MAC layer handoff process
-
A. Mishra, M. Shin, and W. Arbaugh An empirical analysis of the IEEE 802.11 MAC layer handoff process ACM SIGCOMM Computer Communication 33 2 2003 93 102
-
(2003)
ACM SIGCOMM Computer Communication
, vol.33
, Issue.2
, pp. 93-102
-
-
Mishra, A.1
Shin, M.2
Arbaugh, W.3
-
14
-
-
51649098802
-
A location privacy preserving authentication scheme in vehicular networks
-
C. Zhang, R. Lu, P. Ho, A. Chen, A location privacy preserving authentication scheme in vehicular networks, in: Proceedings of IEEE Wireless Communications and Networking Conference 2008, April 2008, pp. 2543-2548.
-
(2008)
Proceedings of IEEE Wireless Communications and Networking Conference 2008, April
, pp. 2543-2548
-
-
Zhang, C.1
Lu, R.2
Ho, P.3
Chen, A.4
-
15
-
-
77953311942
-
CapAuth: A Capability-based Handover Scheme
-
L Cai, S. Machiraju, H Chen, CapAuth: A Capability-based Handover Scheme, in: Proceedings of IEEE INFOCOM 2010, USA, March 2010, pp.1-5.
-
(2010)
Proceedings of IEEE INFOCOM 2010, USA, March
, pp. 1-5
-
-
Cai, L.1
MacHiraju, S.2
Chen, H.3
-
16
-
-
38549176356
-
SFRIC: A secure fast roaming scheme in wireless LAN using ID-based cryptography
-
DOI 10.1109/ICC.2007.263, 4288934, 2007 IEEE International Conference on Communications, ICC'07
-
Y. Kim, W. Ren, J. Jo, M. Yang, Y. Jiang, J. Zheng, SFRIC: a secure fast roaming scheme in wireless LAN using ID-based cryptography, in Proceedings of IEEE International Conference on Communications(ICC '07), June 2007, pp. 1570-1575. (Pubitemid 351145759)
-
(2007)
IEEE International Conference on Communications
, pp. 1570-1575
-
-
Kim, Y.1
Ren, W.2
Jo, J.-Y.3
Yang, M.4
Jiang, Y.5
Zheng, J.6
-
17
-
-
75449110407
-
A handover authentication using credentials based on chameleon hashing
-
J. Choi, and S. Jung A handover authentication using credentials based on chameleon hashing IEEE Communications Letters 14 1 2010 54 56
-
(2010)
IEEE Communications Letters
, vol.14
, Issue.1
, pp. 54-56
-
-
Choi, J.1
Jung, S.2
-
19
-
-
84863163057
-
A Privacy Preserving Handover Authentication Scheme for EAP-Based Wireless Networks
-
J. Qi, Y. Zhang, A. Fu, X. Liu, A Privacy Preserving Handover Authentication Scheme for EAP-Based Wireless Networks, in: Proceeding of GLOBECOM 2011, December 2011, pp.1-6.
-
(2011)
Proceeding of GLOBECOM 2011, December
, pp. 1-6
-
-
Qi, J.1
Zhang, Y.2
Fu, A.3
Liu, X.4
-
20
-
-
78650029126
-
Cryptanalysis of a handover authentication scheme using credentials based on chameleon hashing
-
E.J. Yoon, M.K. Khan, and K.Y. Yoo Cryptanalysis of a handover authentication scheme using credentials based on chameleon hashing IEICE TRANSACTIONS on Information and Systems E93-D 12 2010 3400 3402
-
(2010)
IEICE TRANSACTIONS on Information and Systems
, vol.E93-D
, Issue.12
, pp. 3400-3402
-
-
Yoon, E.J.1
Khan, M.K.2
Yoo, K.Y.3
-
21
-
-
83055190294
-
-
3rd Generation Partnership Project; Technical Specification Group Service and System Aspects 3GPP TS 22.220 V11.2.0, June
-
3rd Generation Partnership Project; Technical Specification Group Service and System Aspects; Service requirements for Home Node B(HNB) and Home eNode B(HeNB) (Rel 11), 3GPP TS 22.220 V11.2.0, June 2011.
-
(2011)
Service Requirements for Home Node B(HNB) and Home ENode B(HeNB) (Rel 11)
-
-
-
22
-
-
0030231965
-
Proxy signatures: Delegation of the power to sign messages
-
M. Mambo, K. Usuda, and E. Okamoto Proxy signatures: delegation of the power to sign messages IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E79-A 9 1996 1338 1354
-
(1996)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E79-A
, Issue.9
, pp. 1338-1354
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
23
-
-
0010567510
-
Proxy signatures, Revisited
-
S. Kim, S Park, D. Won, Proxy signatures, Revisited, in: Proceedings of the First International Conference on Information and Communication Security, vol. 1334, 1997, pp. 223-232. (Pubitemid 127148050)
-
(1997)
Lecture Notes in Computer Science
, Issue.1334
, pp. 223-232
-
-
Kim, S.1
Park, S.2
Won, D.3
-
24
-
-
12344258539
-
Efficient signature generation by smart cards
-
C.P. Schnorr Efficient signature generation by smart cards Journal of Cryptology 4 3 1991 161 174
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
25
-
-
84875915392
-
-
3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G security 3GPP TS 33.210 V11.2.0, June
-
3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G security; Network Domain Security (NDS); IP network layer security (Rel 11), 3GPP TS 33.210 V11.2.0, June 2011.
-
(2011)
Network Domain Security (NDS); IP Network Layer Security (Rel 11)
-
-
-
26
-
-
84862817973
-
-
3rd Generation Partnership Project; Technical Specification Group Services and System Aspects 3GPP TS 33.320 V11.3.0, September
-
3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Security of Home Node B (HNB)/Home evolved Node B (HeNB) (Rel 11), 3GPP TS 33.320 V11.3.0, September 2011.
-
(2011)
Security of Home Node B (HNB)/Home Evolved Node B (HeNB) (Rel 11)
-
-
-
29
-
-
84862816447
-
-
OPENSSL
-
OPENSSL, http://www.openssl.org/.
-
-
-
|