-
4
-
-
79959303344
-
EKMP: An enhanced key management protocol for IEEE 802.16m
-
Cancun, Mexico, March 2011
-
Fu, A., Zhang, Y., Zhu, Z., & Feng, J. (2011). EKMP: an enhanced key management protocol for IEEE 802.16m. In Proceedings of the IEEE WCNC (pp. 1960-1965). Cancun, Mexico, March 2011.
-
(2011)
Proceedings of the IEEE WCNC
, pp. 1960-1965
-
-
Fu, A.1
Zhang, Y.2
Zhu, Z.3
Feng, J.4
-
5
-
-
58149311082
-
Kerberized handover keying: A media-independent handover key management architecture
-
Ohba, Y., Das, S., & Dutta, A. (2007). Kerberized handover keying: A media-independent handover key management architecture. In Proceedings of the MobiArch. Kyoto, Japan, August 2007.
-
(2007)
Proceedings of the MobiArch. Kyoto, Japan, August 2007
-
-
Ohba, Y.1
Das, S.2
Dutta, A.3
-
6
-
-
77953311942
-
CapAuth: A capability-based handover scheme
-
San Diego, USA, March 2010
-
Cai, L., Machiraju, S., & Chen, H. (2010). CapAuth: A capability-based handover scheme. In Proceedings of the INFOCOM (pp. 1-5). San Diego, USA, March 2010.
-
(2010)
Proceedings of the INFOCOM
, pp. 1-5
-
-
Cai, L.1
MacHiraju, S.2
Chen, H.3
-
7
-
-
78649983188
-
A fast handover authentication mechanism based on ticket for IEEE 802.16m
-
10.1109/LCOMM.2010.12.100818
-
Fu A., Zhang Y., Zhu Z., Liu X. (2010) A fast handover authentication mechanism based on ticket for IEEE 802.16m. IEEE Commununications Letters 14(12): 1134-1136
-
(2010)
IEEE Commununications Letters
, vol.14
, Issue.12
, pp. 1134-1136
-
-
Fu, A.1
Zhang, Y.2
Zhu, Z.3
Liu, X.4
-
8
-
-
4544274584
-
Hybrid multilayer mobility management with AAA context transfer capabilities for all-IP networks
-
10.1109/MWC.2004.1325894
-
Politis C., Chew K. A., Akhtar N., Georgiades M., Tafazolli R., Dagiuklas T. (2004) Hybrid multilayer mobility management with AAA context transfer capabilities for all-IP networks. IEEE Wireless Communication 11(4): 76-88
-
(2004)
IEEE Wireless Communication
, vol.11
, Issue.4
, pp. 76-88
-
-
Politis, C.1
Chew, K.A.2
Akhtar, N.3
Georgiades, M.4
Tafazolli, R.5
Dagiuklas, T.6
-
9
-
-
33745903395
-
Fast re-authentication for handovers in wireless communication networks
-
Coimbra, Portugal, May 2006
-
Wienzek, R. & Persaud, R. (2006). Fast re-authentication for handovers in wireless communication networks. In Proceedings of the IFIP-TC6 Networking 2006 (pp. 556-567). Coimbra, Portugal, May 2006.
-
(2006)
Proceedings of the IFIP-TC6 Networking 2006
, pp. 556-567
-
-
Wienzek, R.1
Persaud, R.2
-
10
-
-
70349560401
-
A cluster-chain-based context transfer mechanism for fast basic service set transition in the centralized wireless LAN architecture
-
10.1002/wcm.726
-
Huang C. M., Li J. W. (2009) A cluster-chain-based context transfer mechanism for fast basic service set transition in the centralized wireless LAN architecture. Wireless Communications and Mobile Computing 9(10): 1387-1401
-
(2009)
Wireless Communications and Mobile Computing
, vol.9
, Issue.10
, pp. 1387-1401
-
-
Huang, C.M.1
Li, J.W.2
-
11
-
-
77953783779
-
Handoff minimization through a relay station grouping algorithm with efficient radio-resource scheduling policies for IEEE 802.16j multihop relay networks
-
10.1109/TVT.2010.2041677
-
Yang S. R., Kao C. C., Kan W. C., Shih T. C. (2010) Handoff minimization through a relay station grouping algorithm with efficient radio-resource scheduling policies for IEEE 802.16j multihop relay networks. IEEE Transactions on Vehicular Technology 59(5): 2185-2197
-
(2010)
IEEE Transactions on Vehicular Technology
, vol.59
, Issue.5
, pp. 2185-2197
-
-
Yang, S.R.1
Kao, C.C.2
Kan, W.C.3
Shih, T.C.4
-
12
-
-
28244441893
-
Location management of correlated mobile users in the UMTS
-
10.1109/TMC.2005.89
-
Gau R., Lin C. (2005) Location management of correlated mobile users in the UMTS. IEEE Transactions on Mobile Computing 4(6): 641-651
-
(2005)
IEEE Transactions on Mobile Computing
, vol.4
, Issue.6
, pp. 641-651
-
-
Gau, R.1
Lin, C.2
-
13
-
-
67649996226
-
Performance analysis of group handover scheme for IEEE 802.16j-enabled vehicular networks
-
Suzhou, China, April 2009
-
Shan, L., Liu, F., & Yang, K. (2009). Performance analysis of group handover scheme for IEEE 802.16j-enabled vehicular networks. In Proceedings of the advances in data and web management (pp. 653-658). Suzhou, China, April 2009.
-
(2009)
Proceedings of the Advances in Data and Web Management
, pp. 653-658
-
-
Shan, L.1
Liu, F.2
Yang, K.3
-
14
-
-
0000838441
-
Uses of elliptic curves in cryptography
-
Santa Barbara, USA, August 2005
-
Miller, V. (2005). Uses of elliptic curves in cryptography. In Proceedings of the CRYPTO (pp. 417-426). Santa Barbara, USA, August 2005.
-
(2005)
Proceedings of the CRYPTO
, pp. 417-426
-
-
Miller, V.1
-
15
-
-
40749151471
-
Adaptive hysteresis using mobility correlation for fast handover
-
10.1109/LCOMM.2008.071316
-
Lee L., Kim D., Chung B., Yoon H. (2008) Adaptive hysteresis using mobility correlation for fast handover. IEEE Communications Letters 12(2): 152-154
-
(2008)
IEEE Communications Letters
, vol.12
, Issue.2
, pp. 152-154
-
-
Lee, L.1
Kim, D.2
Chung, B.3
Yoon, H.4
-
16
-
-
78649411023
-
Optimal handover decision algorithm for throughput enhancement in cooperative cellular networks
-
Ottawa, Canada, September 2010
-
Choi, H. H., Lim, J. B., Hwang, H., & Jang, K. (2010). Optimal handover decision algorithm for throughput enhancement in cooperative cellular networks. In Proceedings of the VTCfall (pp. 1-5). Ottawa, Canada, September 2010.
-
(2010)
Proceedings of the VTCfall
, pp. 1-5
-
-
Choi, H.H.1
Lim, J.B.2
Hwang, H.3
Jang, K.4
-
19
-
-
33646227667
-
Automated security protocol analysis with the AVISPA tool
-
10.1016/j.entcs.2005.11.052
-
Viganò L. (2006) Automated security protocol analysis with the AVISPA tool. Electronic Notes in Theoretical Computer Science 155: 61-86
-
(2006)
Electronic Notes in Theoretical Computer Science
, vol.155
, pp. 61-86
-
-
Viganò, L.1
-
20
-
-
84878550484
-
-
AVISPA v1.1
-
AVISPA v1.1, http://www.avispa-project.org/.
-
-
-
-
21
-
-
79952059658
-
Lightweight and provably secure user authentication with anonymity for the global mobility network
-
10.1002/dac.1158
-
Chen C., He D., Chan S., Bu J. (2011) Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems 24(3): 347-362
-
(2011)
International Journal of Communication Systems
, vol.24
, Issue.3
, pp. 347-362
-
-
Chen, C.1
He, D.2
Chan, S.3
Bu, J.4
-
22
-
-
84862821633
-
A simple and robust handover authentication between HeNB and eNB in LTE networks
-
10.1016/j.comnet.2012.02.012
-
Cao J., Li H., Ma M., Zhang Y., Lai C. (2012) A simple and robust handover authentication between HeNB and eNB in LTE networks. Computer Networks 56(8): 2119-2131
-
(2012)
Computer Networks
, vol.56
, Issue.8
, pp. 2119-2131
-
-
Cao, J.1
Li, H.2
Ma, M.3
Zhang, Y.4
Lai, C.5
-
23
-
-
0020720357
-
On the security of public key protocols
-
712376 0502.94005 10.1109/TIT.1983.1056650
-
Dolev D., Yao A. (1983) On the security of public key protocols. IEEE Transactions on Information Theory 29(2): 198-208
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
24
-
-
26444494997
-
An empirical analysis of the IEEE 802.11 MAC layer handoff process
-
10.1145/956981.956990
-
Mishra A., Shin M., Arbaugh W. (2003) An empirical analysis of the IEEE 802.11 MAC layer handoff process. ACM SIGCOMM Computer and Communication Review 33(2): 93-102
-
(2003)
ACM SIGCOMM Computer and Communication Review
, vol.33
, Issue.2
, pp. 93-102
-
-
Mishra, A.1
Shin, M.2
Arbaugh, W.3
-
25
-
-
58149131215
-
TUA: A novel compromise-resilient authentication system for wireless mesh networks
-
10.1109/TWC.2008.060990
-
Lin X., Lu R., Ho P. H., Shen X., Cao Z. (2008) TUA: A novel compromise-resilient authentication system for wireless mesh networks. IEEE Transaction on Wireless Communication 7(4): 1389-1399
-
(2008)
IEEE Transaction on Wireless Communication
, vol.7
, Issue.4
, pp. 1389-1399
-
-
Lin, X.1
Lu, R.2
Ho, P.H.3
Shen, X.4
Cao, Z.5
-
26
-
-
65249105433
-
Handover keying and its uses
-
10.1109/MNET.2009.4804333
-
Zheng X., Sarikaya B. (2009) Handover keying and its uses. IEEE Network 23(2): 27-34
-
(2009)
IEEE Network
, vol.23
, Issue.2
, pp. 27-34
-
-
Zheng, X.1
Sarikaya, B.2
-
27
-
-
77955333303
-
Analysis of handover key management schemes under IETF perspective
-
10.1016/j.csi.2009.10.001
-
Marin-Lopez R., Yoshihiro O., Fernando P. G., Gomez A. F. (2010) Analysis of handover key management schemes under IETF perspective. Computer Standards and Interfaces 32(5-6): 266-273
-
(2010)
Computer Standards and Interfaces
, vol.32
, Issue.5-6
, pp. 266-273
-
-
Marin-Lopez, R.1
Yoshihiro, O.2
Fernando, P.G.3
Gomez, A.F.4
|