-
1
-
-
62149116869
-
Network access security in next-generation 3GPP systems: A tutorial
-
Feb
-
C. B. Sankaran, "Network access security in next-generation 3GPP systems: a tutorial," IEEE Commun. Mag., vol. 47, no. 2, pp. 84-91, Feb 2009.
-
(2009)
IEEE Commun. Mag
, vol.47
, Issue.2
, pp. 84-91
-
-
Sankaran, C.B.1
-
3
-
-
84867898068
-
-
3rd Generation Partnership Project; Technical Specification Group Core Network And Terminals; Access To The 3GPP Evolved Packet Core (EPC) Via Non-3GPP Access Networks (Rel11) 3GPP TS 24.302 V11.2.0 Mar
-
3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Access to the 3GPP Evolved Packet Core (EPC) via non-3GPP access networks (Rel11), 3GPP TS 24.302 V11.2.0, Mar. 2012.
-
(2012)
-
-
-
4
-
-
84867895573
-
-
3rd Generation Partnership Project; Technical Specification Group Services System Aspects; 3GPP TS 22.278 V12.0.0, Dec
-
3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Service requirements for the Evolved Packet System (EPS) (Rel12), 3GPP TS 22.278 V12.0.0, Dec. 2011.
-
(2011)
Service requirements for the Evolved Packet System (EPS) (Rel12)
-
-
-
5
-
-
84867900593
-
-
3rd Generation Partnership Project; Technical Specification Group ServicesSystem Aspects; 3GPP TS 23.402 V11.2.0, Mar
-
3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Architecture enhancements for non-3GPP accesses (Rel11), 3GPP TS 23.402 V11.2.0, Mar. 2012.
-
(2012)
Architecture Enhancements for non-3GPP Accesses (Rel11)
-
-
-
6
-
-
84862816446
-
An authentication scheme for fast handover between WiFi access points
-
ACM Wireless Internet Conference
-
A. Bohk, L. Buttyn, and L. Dra, "An authentication scheme for fast handover between WiFi access points," in Proc. 2007 ACM Wireless Internet Conference, pp. 22-24.
-
(2007)
Proc
, pp. 22-24
-
-
Bohk, A.1
Buttyn, L.2
Dra, L.3
-
7
-
-
79960524688
-
Fast and secure reauthentications for 3GPP subscribers during WiMAX-WLAN handovers
-
Sep.-Oct
-
A. A. Al Shidhani and V. C. M.Leung, "Fast and secure reauthentications for 3GPP subscribers during WiMAX-WLAN handovers," IEEE Trans. Dependable and Secure Computing, vol. 8, no. 5, pp. 699-713, Sep.-Oct. 2011.
-
(2011)
IEEE Trans. Dependable and Secure Computing
, vol.8
, Issue.5
, pp. 699-713
-
-
Al Shidhani, A.A.1
Leung, V.C.M.2
-
8
-
-
51649098802
-
A location privacy preserving authentication scheme in vehicular networks
-
C. Zhang, R. Lu, P. Ho, and A. Chen, "A location privacy preserving authentication scheme in vehicular networks," in Proc. 2008 IEEE Wireless Communications and Networking Conference, pp. 2543-2548.
-
(2008)
Proc IEEE Wireless Communications and Networking Conference
, pp. 2543-2548
-
-
Zhang, C.1
Lu, R.2
Ho, P.3
Chen, A.4
-
9
-
-
77953311942
-
CapAuth: A capability-based handover scheme
-
L. Cai, S. Machiraju, and H. Chen, "CapAuth: a capability-based handover scheme," in Proc. 2010 IEEE INFOCOM, pp. 1-5.
-
(2010)
Proc IEEE INFOCOM
, pp. 1-5
-
-
Cai, L.1
MacHiraju, S.2
Chen, H.3
-
10
-
-
38549176356
-
SFRIC: A secure fast roaming scheme in wireless LAN using ID-based cryptography
-
Y. Kim,W. Ren, J. Jo, M. Yang, Y. Jiang, and J. Zheng, "SFRIC: a secure fast roaming scheme in wireless LAN using ID-based cryptography," in Proc. 2007 IEEE International Conference on Communications, pp. 1570-1575.
-
(2007)
Proc IEEE International Conference on Communications
, pp. 1570-1575
-
-
Kimw. Ren, Y.1
Jo, J.2
Yang, M.3
Jiang, Y.4
Zheng, J.5
-
11
-
-
75449110407
-
A handover authentication using credentials based on chameleon hashing
-
Jan
-
J. Choi and S. Jung, "A handover authentication using credentials based on chameleon hashing," IEEE Commun. Lett., vol. 14, no. 1, pp. 54-56, Jan. 2010.
-
(2010)
IEEE Commun. Lett
, vol.14
, Issue.1
, pp. 54-56
-
-
Choi, J.1
Jung, S.2
-
12
-
-
74549210063
-
Universal authentication protocols for anonymous wireless communications
-
G. Yang, Q. Huang, D. S. Wong, and X. Deng, "Universal authentication protocols for anonymous wireless communications," IEEE Trans. Wireless Commun., vol. 9, pp. 168-174, 2010.
-
(2010)
IEEE Trans. Wireless Commun
, vol.9
, pp. 168-174
-
-
Yang, G.1
Huang, Q.2
Wong, D.S.3
Deng, X.4
-
13
-
-
78650029126
-
Cryptanalysis of a handover authentication scheme using credentials based on chameleon hashing
-
Dec
-
E. J. Yoon, M. K. Khan, and K. Y. Yoo, "Cryptanalysis of a handover authentication scheme using credentials based on chameleon hashing," IEICE Trans. Inf. and Syst., vol. E93-D, no. 12, pp. 3400-3402, Dec. 2010.
-
(2010)
IEICE Trans. Inf. and Syst., Vol. E93-D
, Issue.12
, pp. 3400-3402
-
-
Yoon, E.J.1
Khan, M.K.2
Yoo, K.Y.3
-
14
-
-
78049296439
-
A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges
-
Aug
-
X. Cao, W. Kou, and X. Du, "A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges," Inf. Sciences, vol. 180, no. 15, pp. 2895-2903, Aug. 2010.
-
(2010)
Inf. Sciences
, vol.180
, Issue.15
, pp. 2895-2903
-
-
Cao, X.1
Kou, W.2
Du, X.3
-
16
-
-
84867899684
-
-
3rd Generation Partnership Project; Technical Specification Group Service, System Aspects; 3GPP TS 33.402 V11.3.1, Mar
-
3rd Generation Partnership Project; Technical Specification Group Service and System Aspects; 3GPP System Architecture Evolution (SAE); Security aspects of non-3GPP accesses(Rel 11), 3GPP TS 33.402 V11.3.1, Mar. 2012.
-
(2012)
3GPP System Architecture Evolution (SAE); Security Aspects of non-3GPP Accesses(Rel 11)
-
-
-
19
-
-
46249123717
-
Automatic vulnerability checking of
-
P. Narayana, R. Chen, Y. Zhao, Y. Chen, Z. Fu, and H. Zhou, "Automatic vulnerability checking of IEEE 802.16 WiMAX protocols through TLA+," in Proc. 2006 IEEE Workshop on Secure Network Protocols, pp. 44-49.
-
IEEE 802.16 WiMAX Protocols Through TLA+in Proc. 2006 IEEE Workshop on Secure Network Protocols
, pp. 44-49
-
-
Narayana, P.1
Chen, R.2
Zhao, Y.3
Chen, Y.4
Fu, Z.5
Zhou, H.6
|