-
2
-
-
85029607281
-
-
AVISPA v1.1, http://www.avispa-project.org/.
-
AVISPA v1.1
-
-
-
3
-
-
72249091884
-
IEEE 802.16: History, status and future trends
-
A. Bacioccola, C. Cicconetti, C. Eklundc, L. Lenzinia, Z. Lib, and E. Mingozzi IEEE 802.16: history, status and future trends Comput Commun 33 2 Feb. 2010 113 123
-
(2010)
Comput Commun
, vol.33
, Issue.2
, pp. 113-123
-
-
Bacioccola, A.1
Cicconetti, C.2
Eklundc, C.3
Lenzinia, L.4
Lib, Z.5
Mingozzi, E.6
-
5
-
-
84862821633
-
A simple and robust handover authentication between HeNB and eNB in LTE networks
-
Available online 2 March
-
Cao J, Li H, Ma M, Zhang Y, Lai C. A simple and robust handover authentication between HeNB and eNB in LTE networks. Comput Netw, Available online 2 March 2012.
-
(2012)
Comput Netw
-
-
Cao, J.1
Li, H.2
Ma, M.3
Zhang, Y.4
Lai, C.5
-
6
-
-
79952059658
-
Lightweight and provably secure user authentication with anonymity for the global mobility network
-
C. Chen, D. He, S. Chan, J. Bu, Y. Gao, and R. Fan Lightweight and provably secure user authentication with anonymity for the global mobility network Int J Commun Syst 24 3 Mar. 2011 347 362
-
(2011)
Int J Commun Syst
, vol.24
, Issue.3
, pp. 347-362
-
-
Chen, C.1
He, D.2
Chan, S.3
Bu, J.4
Gao, Y.5
Fan, R.6
-
7
-
-
75449110407
-
A handover authentication using credentials based on chameleon hashing
-
J. Choi, and S. Jung A handover authentication using credentials based on chameleon hashing IEEE Commun Lett 14 1 Jan. 2010 54 56
-
(2010)
IEEE Commun Lett
, vol.14
, Issue.1
, pp. 54-56
-
-
Choi, J.1
Jung, S.2
-
8
-
-
0020720357
-
On the security of public key protocols
-
D. Dolev, and A. Yao On the security of public key protocols IEEE Trans Inf Theory 29 2 Feb. 1983 198 208
-
(1983)
IEEE Trans Inf Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
9
-
-
84865272578
-
EKMP: An enhanced key management protocol for IEEE 802.16m
-
Cancun, Mexico; Mar.
-
Fu A, Zhang Y, Zhu Z, Feng J. EKMP: an enhanced key management protocol for IEEE 802.16m. In: Proc. WCNC'11. Cancun, Mexico; Mar. 2011. p. 1960-1965.
-
(2011)
Proc. WCNC'11
, pp. 1960-1965
-
-
Fu, A.1
Zhang, Y.2
Zhu, Z.3
Feng, J.4
-
10
-
-
78649983188
-
A fast handover authentication mechanism based on ticket for IEEE 802.16m
-
A. Fu, Y. Zhang, Z. Zhu, and X. Liu A fast handover authentication mechanism based on ticket for IEEE 802.16m IEEE Commun Lett 14 12 Dec. 2010 1134 1136
-
(2010)
IEEE Commun Lett
, vol.14
, Issue.12
, pp. 1134-1136
-
-
Fu, A.1
Zhang, Y.2
Zhu, Z.3
Liu, X.4
-
12
-
-
69249144890
-
KTR: An efficient key management scheme for secure data access control in wireless broadcast services
-
Q. Gu, P. Liu, W.C. Lee, and C.H. Chu KTR: an efficient key management scheme for secure data access control in wireless broadcast services IEEE Trans Depend Secure 6 3 Jul./Sep.; 2009 188 201
-
(2009)
IEEE Trans Depend Secure
, vol.6
, Issue.3
, pp. 188-201
-
-
Gu, Q.1
Liu, P.2
Lee, W.C.3
Chu, C.H.4
-
14
-
-
70349560401
-
A cluster-chain-based context transfer mechanism for fast basic service set transition in the centralized wireless LAN architecture
-
C.M. Huang, and J.W. Li A cluster-chain-based context transfer mechanism for fast basic service set transition in the centralized wireless LAN architecture Wirel Commun Mob Comput 9 10 Oct. 2009 1387 1401
-
(2009)
Wirel Commun Mob Comput
, vol.9
, Issue.10
, pp. 1387-1401
-
-
Huang, C.M.1
Li, J.W.2
-
16
-
-
38549176356
-
SFRIC: A secure fast roaming scheme in wireless LAN using ID-based cryptography
-
Kim Y, Ren W, Jo JY, Jiang Y, Zheng J. SFRIC: a secure fast roaming scheme in wireless LAN using ID-based cryptography. In: Proc. ICC; 2007, p. 1570-1575.
-
(2007)
Proc. ICC
, pp. 1570-1575
-
-
Kim, Y.1
Ren, W.2
Jo, J.Y.3
Jiang, Y.4
Zheng, J.5
-
17
-
-
67349253018
-
A strong privacy-preserving against global eavesdropping for ehealth systems
-
X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato A strong privacy-preserving against global eavesdropping for ehealth systems IEEE J Sel Areas Commun 27 4 May 2009 365 378
-
(2009)
IEEE J Sel Areas Commun
, vol.27
, Issue.4
, pp. 365-378
-
-
Lin, X.1
Lu, R.2
Shen, X.3
Nemoto, Y.4
Kato, N.5
-
19
-
-
77954429311
-
Location privacy against traffic analysis attacks in wireless sensor networks
-
Apr
-
Luo X, Ji X, Park MS. Location privacy against traffic analysis attacks in wireless sensor networks. In: Proc. ICISA 2010; Apr. 2010, p. 1-6.
-
(2010)
Proc. ICISA 2010
, pp. 1-6
-
-
Luo, X.1
Ji, X.2
Park, M.S.3
-
20
-
-
44349195348
-
Use of EAP-AKA, IETF HOKEY and AAA mechanisms to provide access and handover security and 3G-802.16M interworking
-
Sept
-
Nakhjiri M. Use of EAP-AKA, IETF HOKEY and AAA mechanisms to provide access and handover security and 3G-802.16M interworking. In: Proc. PIMRC'07; Sept. 2007. p. 1-5.
-
(2007)
Proc. PIMRC'07
, pp. 1-5
-
-
Nakhjiri, M.1
-
22
-
-
58149311082
-
Kerberized handover keying: A media-independent handover key management architecture
-
Aug
-
Ohba Y, Das S, Dutta A. Kerberized handover keying: a media-independent handover key management architecture. In: Proc. MobiArch 2007; Aug. 2007.
-
(2007)
Proc. MobiArch 2007
-
-
Ohba, Y.1
Das, S.2
Dutta, A.3
-
23
-
-
4544274584
-
Hybrid multilayer mobility management with AAA context transfer capabilities for all-IP networks
-
C. Politis, K.A. Chew, N. Akhtar, M. Georgiades, R. Tafazolli, and T. Dagiuklas Hybrid multilayer mobility management with AAA context transfer capabilities for all-IP networks IEEE Wirel Commun 11 4 Aug. 2004 76 88
-
(2004)
IEEE Wirel Commun
, vol.11
, Issue.4
, pp. 76-88
-
-
Politis, C.1
Chew, K.A.2
Akhtar, N.3
Georgiades, M.4
Tafazolli, R.5
Dagiuklas, T.6
-
24
-
-
77952423508
-
A kerberized architecture for fast re-authentication in heterogeneous wireless networks
-
M.L. Rafa, P.G. Fernando, O. Yoshihiro, B.H. Fernando, and F.G. Antonio A kerberized architecture for fast re-authentication in heterogeneous wireless networks Mob Netw Appl 15 3 2010 392 412
-
(2010)
Mob Netw Appl
, vol.15
, Issue.3
, pp. 392-412
-
-
Rafa, M.L.1
Fernando, P.G.2
Yoshihiro, O.3
Fernando, B.H.4
Antonio, F.G.5
-
25
-
-
77955333303
-
Analysis of handover key management schemes under IETF perspective
-
M.L. Rafa, O. Yoshihiro, P.G. Fernando, and A.F. Gomez Analysis of handover key management schemes under IETF perspective Comput Stand Interfaces 32 5-6 2010 266 273
-
(2010)
Comput Stand Interfaces
, vol.32
, Issue.56
, pp. 266-273
-
-
Rafa, M.L.1
Yoshihiro, O.2
Fernando, P.G.3
Gomez, A.F.4
-
26
-
-
77955229114
-
An identity-based security system for user privacy in vehicular ad hoc networks
-
J.Y. Sun, C. Zhang, Y.C. Zhang, and Y. Fang An identity-based security system for user privacy in vehicular ad hoc networks IEEE Trans Parallel Distrib Syst 21 9 Sept. 2010
-
(2010)
IEEE Trans Parallel Distrib Syst
, vol.21
, Issue.9
-
-
Sun, J.Y.1
Zhang, C.2
Zhang, Y.C.3
Fang, Y.4
-
27
-
-
33646227667
-
Automated security protocol analysis with the AVISPA tool
-
L. Vigan Automated security protocol analysis with the AVISPA tool Electron Notes Theor Comput Sci 155 2006 61 86
-
(2006)
Electron Notes Theor Comput Sci
, vol.155
, pp. 61-86
-
-
Vigan, L.1
-
28
-
-
79960862937
-
Anonymous communication with network coding against traffic analysis attack
-
Mar
-
Wang J, Wang J, Wu C, Lu K, Gu N. Anonymous communication with network coding against traffic analysis attack. In: Proc. IEEE INFOCOM 2011; Mar. 2011. p. 1008-1016.
-
(2011)
Proc. IEEE INFOCOM 2011
, pp. 1008-1016
-
-
Wang, J.1
Wang, J.2
Wu, C.3
Lu, K.4
Gu, N.5
-
29
-
-
51649098802
-
A location privacy preserving authentication scheme in vehicular networks
-
Mar
-
Zhang C, Liu R, Ho PH, Chen A. A location privacy preserving authentication scheme in vehicular networks. In: Proc. WCNC 2008; Mar. 2008. p. 2543-2548.
-
(2008)
Proc. WCNC 2008
, pp. 2543-2548
-
-
Zhang, C.1
Liu, R.2
Ho, P.H.3
Chen, A.4
-
30
-
-
65249105433
-
Handover keying and its uses
-
X. Zheng, and B. Sarikaya Handover keying and its uses IEEE Netw 23 2 Mar. 2009 27 34
-
(2009)
IEEE Netw
, vol.23
, Issue.2
, pp. 27-34
-
-
Zheng, X.1
Sarikaya, B.2
|