-
1
-
-
84948733947
-
-
Hoboken USA: Wiley Online Library
-
S. Sesia, I. Toufik, and M. Baker, LTE-The UMTS Long Term Evolution: From Theory to Practice. Hoboken, USA: vol. 66, Wiley Online Library, 2009.
-
(2009)
LTE-The UMTS Long Term Evolution: From Theory to Practice
, vol.66
-
-
Sesia, S.1
Toufik, I.2
Baker, M.3
-
3
-
-
36749076982
-
Gsis:asecure and privacy-preserving protocol for vehicular communications
-
Nov.
-
X. Lin, X. Sun, P. Ho, and X. Shen, "GSIS:Asecure and privacy-preserving protocol for vehicular communications," IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3442-3456, Nov. 2007.
-
(2007)
IEEE Trans. Veh. Technol.
, vol.56
, Issue.6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.3
Shen, X.4
-
4
-
-
51349156734
-
Ecpp: Efficient conditional privacy preservation protocol for secure vehicular communications
-
R. Lu, X. Lin, H. Zhu, P. Ho, and X. Shen, "ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications," in Proc. IEEE INFOCOM, 2008, pp. 1229-1237.
-
(2008)
Proc. IEEE INFOCOM
, pp. 1229-1237
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Ho, P.4
Shen, X.5
-
5
-
-
79960524688
-
Fast and secure reauthentications for 3gpp subscribers during wimax-wlan handovers
-
Sep./Oct.
-
A. Al Shidhani and V. Leung, "Fast and secure reauthentications for 3GPP subscribers during WiMAX-WLAN handovers," IEEE Trans. Dependable Secure Comput., vol. 8, no. 5, pp. 699-713, Sep./Oct. 2011.
-
(2011)
IEEE Trans. Dependable Secure Comput.
, vol.8
, Issue.5
, pp. 699-713
-
-
Al Shidhani, A.1
Leung, V.2
-
6
-
-
67349259574
-
Improvements to seamless vertical handover between mobile wimax and 3gpp utran through the evolved packet core
-
Apr.
-
W. Song, J. Chung, D. Lee, C. Lim, S. Choi, and T. Yeoum, "Improvements to seamless vertical handover between mobile WiMAX and 3GPP UTRAN through the evolved packet core," IEEE Commun. Mag., vol. 47, no. 4, pp. 66-73, Apr. 2009.
-
(2009)
IEEE Commun. Mag.
, vol.47
, Issue.4
, pp. 66-73
-
-
Song, W.1
Chung, J.2
Lee, D.3
Lim, C.4
Choi, S.5
Yeoum, T.6
-
7
-
-
34247108751
-
Interworking of wimax and 3gpp networks based on ims [ip multimedia systems (ims) infrastructure and services]
-
Mar.
-
F. Xu, L. Zhang, and Z. Zhou, "Interworking of WiMAX and 3GPP networks based on IMS [IP multimedia systems (IMS) infrastructure and services]," IEEE Commun. Mag., vol. 45, no. 3, pp. 144-150, Mar. 2007.
-
(2007)
IEEE Commun. Mag.
, vol.45
, Issue.3
, pp. 144-150
-
-
Xu, F.1
Zhang, L.2
Zhou, Z.3
-
8
-
-
54949108588
-
Seamless integration of mobile wimax in 3gpp networks
-
Oct.
-
P. Taaghol, A. Salkintzis, and J. Iyer, "Seamless integration of mobile WiMAX in 3GPP networks," IEEE Commun. Mag., vol. 46, no. 10, pp. 74-85, Oct. 2008.
-
(2008)
IEEE Commun. Mag.
, vol.46
, Issue.10
, pp. 74-85
-
-
Taaghol, P.1
Salkintzis, A.2
Iyer, J.3
-
9
-
-
77956877124
-
The internet of things: A survey
-
L. Atzori, A. Iera, and G. Morabito, "The internet of things: A survey," Comput. Netw., vol. 54, no. 15, pp. 2787-2805, 2010.
-
(2010)
Comput. Netw.
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
11
-
-
78650921155
-
From today's intranet of things to a future internet of things: A wireless-And mobility-related view
-
Dec.
-
M. Zorzi, A. Gluhak, S. Lange, and A. Bassi, "From today's INTRAnet of things to a future INTERnet of things: A wireless-And mobility-related view," IEEE Wireless Commun., vol. 17, no. 6, pp. 44-51, Dec. 2010.
-
(2010)
IEEE Wireless Commun.
, vol.17
, Issue.6
, pp. 44-51
-
-
Zorzi, M.1
Gluhak, A.2
Lange, S.3
Bassi, A.4
-
12
-
-
77955097686
-
Perci: Pervasive service interaction with the internet of things
-
Nov./Dec.
-
G. Broll, E. Rukzio, M. Paolucci, M. Wagner, A. Schmidt, and H. Hussmann, "Perci: Pervasive service interaction with the internet of things," IEEE Internet Comput., vol. 13, no. 6, pp. 74-81, Nov./Dec. 2009.
-
(2009)
IEEE Internet Comput.
, vol.13
, Issue.6
, pp. 74-81
-
-
Broll, G.1
Rukzio, E.2
Paolucci, M.3
Wagner, M.4
Schmidt, A.5
Hussmann, H.6
-
13
-
-
84864915214
-
Study on the influence of iot (internet of things) on mobile network
-
H. Li, H. Chen, J. Li, and F. Qi, "Study on the influence of IOT (Internet of Things) on mobile network," in Proc. IET Int. Conf. Commun. Technol. Appl., 2011, pp. 619-621.
-
(2011)
Proc. IET Int. Conf. Commun. Technol. Appl.
, pp. 619-621
-
-
Li, H.1
Chen, H.2
Li, J.3
Qi, F.4
-
14
-
-
84876763139
-
Energy efficient heterogeneous cellular networks
-
May
-
Y. Soh, T. Quek, M. Kountouris, and H. Shin, "Energy efficient heterogeneous cellular networks," IEEE J. Sel. Areas Commun., vol. 31, no. 5, pp. 840-850, May 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.5
, pp. 840-850
-
-
Soh, Y.1
Quek, T.2
Kountouris, M.3
Shin, H.4
-
15
-
-
84874984279
-
Multicell cooperation for lte-Advanced heterogeneous network scenarios
-
Feb.
-
R. Karri, H. Wang, K. I. Pedersen, and C. Rosa, "Multicell cooperation for LTE-Advanced heterogeneous network scenarios," IEEE Wireless Commun., vol. 20, no. 1, pp. 27-34, Feb. 2013.
-
(2013)
IEEE Wireless Commun.
, vol.20
, Issue.1
, pp. 27-34
-
-
Karri, R.1
Wang, H.2
Pedersen, K.I.3
Rosa, C.4
-
16
-
-
84879089412
-
A quality of experience handover architecture for heterogeneous mobile wireless multimedia networks
-
Jun.
-
J. Jailton, T. Carvalho, V. Warley, N. Carlos, and R. Francěs, "A quality of experience handover architecture for heterogeneous mobile wireless multimedia networks," IEEE Commun. Mag., vol. 51, no. 6, pp. 152-159, Jun. 2013.
-
(2013)
IEEE Commun. Mag.
, vol.51
, Issue.6
, pp. 152-159
-
-
Jailton, J.1
Carvalho, T.2
Warley, V.3
Carlos, N.4
Francěs, R.5
-
17
-
-
79959603351
-
Hierarchical cooperative relay based heterogeneous networks
-
Jun.
-
M. Peng, Y. Liu, D. Wei, W. Wang, and H. Chen, "Hierarchical cooperative relay based heterogeneous networks," IEEE Wireless Commun., vol. 18, no. 3, pp. 48-56, Jun. 2011.
-
(2011)
IEEE Wireless Commun.
, vol.18
, Issue.3
, pp. 48-56
-
-
Peng, M.1
Liu, Y.2
Wei, D.3
Wang, W.4
Chen, H.5
-
18
-
-
84876037049
-
Lte/sae security issues on 4g wireless networks
-
Mar./Apr.
-
A. Bikos and N. Sklavos, "LTE/SAE security issues on 4G wireless networks," IEEE Secur. Privacy, vol. 11, no. 2, pp. 55-62, Mar./Apr. 2013.
-
(2013)
IEEE Secur. Privacy
, vol.11
, Issue.2
, pp. 55-62
-
-
Bikos, A.1
Sklavos, N.2
-
19
-
-
84873910697
-
Security and efficiency in roaming services for wireless networks: Challenges, approaches, and prospects
-
Feb.
-
D. He, C. Chen, J. Bu, S. Chan, and Y. Zhang, "Security and efficiency in roaming services for wireless networks: Challenges, approaches, and prospects," IEEE Commun. Mag., vol. 51, no. 2, pp. 142-150, Feb. 2013.
-
(2013)
IEEE Commun. Mag.
, vol.51
, Issue.2
, pp. 142-150
-
-
He, D.1
Chen, C.2
Bu, J.3
Chan, S.4
Zhang, Y.5
-
20
-
-
84873848479
-
Spoc: A secure and privacypreserving opportunistic computing framework for mobile-healthcare emergency
-
Mar.
-
R. Lu, X. Lin, and X. Shen, "SPOC: A secure and privacypreserving opportunistic computing framework for mobile-healthcare emergency," IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 3, pp. 614-624, Mar. 2013.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.3
, pp. 614-624
-
-
Lu, R.1
Lin, X.2
Shen, X.3
-
21
-
-
84883057189
-
Public auditing for shared data with efficient user revocation in the cloud
-
B. Wang, B. Li, and H. Li, "Public auditing for shared data with efficient user revocation in the cloud," in Proc. IEEE INFOCOM, 2013, pp. 1-9.
-
(2013)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Wang, B.1
Li, B.2
Li, H.3
-
22
-
-
84856182115
-
Pseudonym changing at social spots: An effective strategy for location privacy in vanets
-
Jan.
-
R. Lu, X. Li, H. Luan, X. Liang, and X. Shen, "Pseudonym changing at social spots: An effective strategy for location privacy in VANETs," IEEE Trans. Veh. Technol., vol. 61, no. 1, pp. 86-96, Jan. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.1
, pp. 86-96
-
-
Lu, R.1
Li, X.2
Luan, H.3
Liang, X.4
Shen, X.5
-
23
-
-
84866513570
-
Morality-driven data forwarding with privacy preservation in mobile social networks
-
Sep.
-
X. Liang, X. Li, H. Luan, R. Lu, X. Lin, and X. Shen, "Morality-driven data forwarding with privacy preservation in mobile social networks," IEEE Trans. Veh. Technol., vol. 61, no. 7, pp. 3209-3221, Sep. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.7
, pp. 3209-3221
-
-
Liang, X.1
Li, X.2
Luan, H.3
Lu, R.4
Lin, X.5
Shen, X.6
-
24
-
-
74549210063
-
Universal authentication protocols for anonymous wireless communications
-
Jan.
-
G. Yang, Q. Huang, D. Wong, and X. Deng, "Universal authentication protocols for anonymous wireless communications," IEEE Trans. Wireless Commun., vol. 9, no. 1, pp. 168-174, Jan. 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.1
, pp. 168-174
-
-
Yang, G.1
Huang, Q.2
Wong, D.3
Deng, X.4
-
25
-
-
79951676054
-
Privacy-preserving universal authentication protocol for wireless communications
-
Feb.
-
D. He, J. Bu, S. Chan, C. Chen, and M. Yin, "Privacy-preserving universal authentication protocol for wireless communications," IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 431-436, Feb. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.2
, pp. 431-436
-
-
He, D.1
Bu, J.2
Chan, S.3
Chen, C.4
Yin, M.5
-
26
-
-
84870064630
-
Group signatures with controllable linkability for dynamic membership
-
J. Hwang, S. Lee, B. Chung, H. S. Cho, and D. Nyang, "Group signatures with controllable linkability for dynamic membership," Inf. Sci., vol. 222, pp. 761-778, 2012.
-
(2012)
Inf. Sci.
, vol.222
, pp. 761-778
-
-
Hwang, J.1
Lee, S.2
Chung, B.3
Cho, H.S.4
Nyang, D.5
-
27
-
-
84874883673
-
Complete eap method: User efficient and forward secure authentication protocol for ieee 802.11 wireless lans
-
Apr.
-
C. Fan, Y. Lin, and R. Hsu, "Complete EAP method: User efficient and forward secure authentication protocol for IEEE 802.11 wireless LANs," IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 4, pp. 672-680, Apr. 2013.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.4
, pp. 672-680
-
-
Fan, C.1
Lin, Y.2
Hsu, R.3
-
28
-
-
84883420493
-
A novel group access authentication and key agreement protocol for machine-type communication
-
Apr.
-
C. Lai, H. Li, X. Li, and J. Cao, "A novel group access authentication and key agreement protocol for machine-type communication," Trans. Emerging Telecommun. Technol., Apr. 2013.
-
(2013)
Trans. Emerging Telecommun. Technol
-
-
Lai, C.1
Li, H.2
Li, X.3
Cao, J.4
-
29
-
-
77951479756
-
3G-WLAN interworking: Security analysis and new authentication and key agreement based on EAP-AKA
-
H. Mun, K. Han, and K. Kim, "3G-WLAN interworking: Security analysis and new authentication and key agreement based on EAP-AKA," in Proc. Wireless Telecommun. Symp., 2009, pp. 1-8.
-
(2009)
Proc. Wireless Telecommun. Symp.
, pp. 1-8
-
-
Mun, H.1
Han, K.2
Kim, K.3
-
31
-
-
17144430885
-
Security analysis and enhancements of 3gpp authentication and key agreement protocol
-
Mar.
-
M. Zhang and Y. Fang, "Security analysis and enhancements of 3GPP authentication and key agreement protocol," IEEE Trans. Wireless Commun., vol. 4, no. 2, pp. 734-742, Mar. 2005.
-
(2005)
IEEE Trans. Wireless Commun.
, vol.4
, Issue.2
, pp. 734-742
-
-
Zhang, M.1
Fang, Y.2
-
35
-
-
70450239489
-
Where eap security claims fail
-
Reliab., Secur. Robustness Workshops
-
K. Hoeper and L. Chen, "Where EAP security claims fail," in Proc. 4th Int. Conf. Heterog. Netw. Quality, Reliab., Secur. Robustness Workshops, 2007, pp. 1-7.
-
(2007)
Proc. 4th Int. Conf. Heterog. Netw. Quality
, pp. 1-7
-
-
Hoeper, K.1
Chen, L.2
-
36
-
-
26444560466
-
Deposit-case attack against secure roaming
-
G. Yang, D. S. Wong, and X. Deng, "Deposit-case attack against secure roaming," in Proc. Inf. Secur. Privacy, 2005, pp. 417-428.
-
(2005)
Proc. Inf. Secur. Privacy
, pp. 417-428
-
-
Yang, G.1
Wong, D.S.2
Deng, X.3
-
37
-
-
36749002169
-
Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
-
Sep.
-
Y. Jiang, C. Lin, X. Shen, and M. Shi, "Mutual authentication and key exchange protocols for roaming services in wireless mobile networks," IEEE Trans. Wireless Commun., vol. 5, no. 9, pp. 2569-2577, Sep. 2006.
-
(2006)
IEEE Trans. Wireless Commun.
, vol.5
, Issue.9
, pp. 2569-2577
-
-
Jiang, Y.1
Lin, C.2
Shen, X.3
Shi, M.4
-
38
-
-
35148874531
-
A service-Agentbased roaming architecture for wlan/cellular integrated networks
-
Sep.
-
M. Shi, H. Rutagemwa, X. Shen, J. Mark, and A. Saleh, "A service-Agentbased roaming architecture for WLAN/Cellular integrated networks," IEEE Trans. Veh. Technol., vol. 56, no. 5, pp. 3168-3181, Sep. 2007.
-
(2007)
IEEE Trans. Veh. Technol.
, vol.56
, Issue.5
, pp. 3168-3181
-
-
Shi, M.1
Rutagemwa, H.2
Shen, X.3
Mark, J.4
Saleh, A.5
-
39
-
-
84874650547
-
Spam: A secure password authentication mechanism for seamless handover in proxy mobile ipv6 networks
-
Mar.
-
M. Chuang, J. Lee, and M. Chen, "SPAM: A secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks," IEEE Syst. J., vol. 7, no. 1, pp. 102-113, Mar. 2013.
-
(2013)
IEEE Syst. J.
, vol.7
, Issue.1
, pp. 102-113
-
-
Chuang, M.1
Lee, J.2
Chen, M.3
-
40
-
-
56749160373
-
A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks
-
Z. Wan, K. Ren, and B. Preneel, "A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks," in Proc. 1st ACM Conf. Wireless Netw. Secur., 2008, pp. 62-67.
-
(2008)
Proc. 1st ACM Conf. Wireless Netw. Secur.
, pp. 62-67
-
-
Wan, Z.1
Ren, K.2
Preneel, B.3
-
41
-
-
38549176356
-
Sfric: A secure fast roaming scheme in wireless lan using id-based cryptography
-
Y. Kim, W. Ren, J. Jo, Y. Jiang, and J. Zheng, "SFRIC: A secure fast roaming scheme in wireless LAN using ID-based cryptography," in Proc. IEEE ICC, 2007, pp. 1570-1575.
-
(2007)
Proc. IEEE ICC
, pp. 1570-1575
-
-
Kim, Y.1
Ren, W.2
Jo, J.3
Jiang, Y.4
Zheng, J.5
-
42
-
-
84875591362
-
An efficient threshold anonymous authentication scheme for privacy-preserving communications
-
Mar.
-
J. Ren and L. Harn, "An efficient threshold anonymous authentication scheme for privacy-preserving communications," IEEE Trans. Wireless Commun., vol. 12, no. 3, pp. 1018-1025, Mar. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.3
, pp. 1018-1025
-
-
Ren, J.1
Harn, L.2
-
44
-
-
84864583229
-
Eppa:anefficient and privacypreserving aggregation scheme for secure smart grid communications
-
Sep.
-
R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, "EPPA:Anefficient and privacypreserving aggregation scheme for secure smart grid communications," IEEETrans. Parallel Distrib. Syst., vol. 23, no. 9, pp. 1621-1631, Sep. 2012.
-
(2012)
IEEETrans. Parallel Distrib. Syst.
, vol.23
, Issue.9
, pp. 1621-1631
-
-
Lu, R.1
Liang, X.2
Li, X.3
Lin, X.4
Shen, X.5
-
45
-
-
38149054118
-
-
[Online]. Available
-
B. Lynn. (2012). PBC Library [Online]. Available: http://crypto.stanford. edu/pbc/
-
(2012)
PBC Library
-
-
Lynn, B.1
|