-
1
-
-
79954417408
-
An overview of vertical handover techniques: Algorithms, protocols and tools
-
Johann, M., Carlos, T., Cano, J., et al. (2011). An overview of vertical handover techniques: Algorithms, protocols and tools. Computer Communications, 34(8), 985–997.
-
(2011)
Computer Communications
, vol.34
, Issue.8
, pp. 985-997
-
-
Johann, M.1
Carlos, T.2
Cano, J.3
-
3
-
-
84879880382
-
The history of WiMAX: A complete survey of the evolution in certification and standardization for IEEE 802.16 and WiMAX
-
Pareit, D., Lannoo, B., Moerman, I., et al. (2012). The history of WiMAX: A complete survey of the evolution in certification and standardization for IEEE 802.16 and WiMAX. IEEE Communications Surveys and Tutorials, 14(4), 1183–1211.
-
(2012)
IEEE Communications Surveys and Tutorials
, vol.14
, Issue.4
, pp. 1183-1211
-
-
Pareit, D.1
Lannoo, B.2
Moerman, I.3
-
4
-
-
58149484924
-
Advanced seamless vertical handoff architecture for WiMAX and WiFi heterogeneous networks with QoS guarantees
-
Chen, Y., Hsia, J., & Liao, Y. (2009). Advanced seamless vertical handoff architecture for WiMAX and WiFi heterogeneous networks with QoS guarantees. Computer Communications, 32(2), 281–293.
-
(2009)
Computer Communications
, vol.32
, Issue.2
, pp. 281-293
-
-
Chen, Y.1
Hsia, J.2
Liao, Y.3
-
5
-
-
54849431369
-
Handover management in integrated WLAN and mobile WiMAX networks
-
Pontes, A., dos Passos, Silva D., Jailton, J., et al. (2008). Handover management in integrated WLAN and mobile WiMAX networks. IEEE Wireless Communications, 15(5), 86–95.
-
(2008)
IEEE Wireless Communications
, vol.15
, Issue.5
, pp. 86-95
-
-
Pontes, A.1
dos Passos, S.D.2
Jailton, J.3
-
6
-
-
6344233247
-
Extensible authentication protocol (EAP)
-
(June)
-
Aboba, B., Blunk, L., Vollbrecht, J. et al. (2004, June). Extensible authentication protocol (EAP), IETF RFC 3748.
-
(2004)
IETF RFC
, pp. 3748
-
-
Aboba, B.1
Blunk, L.2
Vollbrecht, J.3
-
7
-
-
4544274584
-
Hybrid multilayer mobility management with AAA context transfer capabilities for all-IP networks
-
Politis, C., Chew, K., Akhtar, N., et al. (2004). Hybrid multilayer mobility management with AAA context transfer capabilities for all-IP networks. IEEE Wireless Communications, 11(4), 76–88.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.4
, pp. 76-88
-
-
Politis, C.1
Chew, K.2
Akhtar, N.3
-
8
-
-
70350214270
-
A key caching mechanism for reducing WiMAX authentication cost in handoff
-
Hsu, S., & Lin, Y. (2009). A key caching mechanism for reducing WiMAX authentication cost in handoff. IEEE Transactions on Vehicular Technology, 58(8), 4507–4513.
-
(2009)
IEEE Transactions on Vehicular Technology
, vol.58
, Issue.8
, pp. 4507-4513
-
-
Hsu, S.1
Lin, Y.2
-
9
-
-
84865236311
-
An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network
-
Fu, A., Zhang, Y., Zhu, Z., et al. (2012). An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network. Computers and Security, 31(6), 741–749.
-
(2012)
Computers and Security
, vol.31
, Issue.6
, pp. 741-749
-
-
Fu, A.1
Zhang, Y.2
Zhu, Z.3
-
10
-
-
44349195348
-
(2007). Use of EAP-AKA, IETF HOKEY and AAA mechanisms to provide access and handover security and 3G–802.16M interworking
-
Nakhjiri, M. (2007). Use of EAP-AKA, IETF HOKEY and AAA mechanisms to provide access and handover security and 3G–802.16M interworking. In Proceedings of PIMRC’07 (pp. 1–5). September 2007.
-
(2007)
In Proceedings of PIMRC’07
, pp. 1-5
-
-
Nakhjiri, M.1
-
11
-
-
77953320964
-
(2008). EAP extensions for EAP re-authentication protocol (ERP)
-
Narayanan, V., & Dondeti, L. (2008). EAP extensions for EAP re-authentication protocol (ERP). IETF RFC 5296, August 2008.
-
(2008)
IETF RFC
, pp. 5296
-
-
Narayanan, V.1
Dondeti, L.2
-
12
-
-
70349560401
-
A cluster-chain-based context transfer mechanism for fast basic service set transition in the centralized wireless LAN architecture
-
Huang, C. M., & Li, J. W. (2009). A cluster-chain-based context transfer mechanism for fast basic service set transition in the centralized wireless LAN architecture. Wireless Communications and Mobile Computing, 9(10), 1387–1401.
-
(2009)
Wireless Communications and Mobile Computing
, vol.9
, Issue.10
, pp. 1387-1401
-
-
Huang, C.M.1
Li, J.W.2
-
13
-
-
84878562817
-
GHAP: An efficient group-based handover authentication mechanism for IEEE 802.16m networks
-
Fu, A., Zhang, G., Zhang, Y., et al. (2013). GHAP: An efficient group-based handover authentication mechanism for IEEE 802.16m networks. Wireless Personal Communications, 70(4), 1793–1810.
-
(2013)
Wireless Personal Communications
, vol.70
, Issue.4
, pp. 1793-1810
-
-
Fu, A.1
Zhang, G.2
Zhang, Y.3
-
14
-
-
58149311082
-
(2007). Kerberized handover keying: a media-independent handover key management architecture
-
Ohba, Y., Das, S., & Dutta, A. (2007). Kerberized handover keying: a media-independent handover key management architecture. In Proceedings of MobiArch’07 (pp. 1–7), August 2007.
-
(2007)
In Proceedings of MobiArch’07
, pp. 1-7
-
-
Ohba, Y.1
Das, S.2
Dutta, A.3
-
15
-
-
78649983188
-
A fast handover authentication mechanism based on ticket for IEEE 802.16m
-
Fu, A., Zhang, Y., Zhu, Z., et al. (2010). A fast handover authentication mechanism based on ticket for IEEE 802.16m. IEEE Communications Letters, 14(12), 1134–1136.
-
(2010)
IEEE Communications Letters
, vol.14
, Issue.12
, pp. 1134-1136
-
-
Fu, A.1
Zhang, Y.2
Zhu, Z.3
-
16
-
-
38549176356
-
SFRIC: a secure Fast roaming scheme in wireless LAN using ID-based cryptography
-
Kim, Y., Ren, W., Jo, J. et al. (2007). SFRIC: a secure Fast roaming scheme in wireless LAN using ID-based cryptography. In Proceedings of ICC’07 (pp. 1570–1575).
-
(2007)
In Proceedings of ICC’07
, pp. 1570-1575
-
-
Kim, Y.1
Ren, W.2
Jo, J.3
-
17
-
-
75449110407
-
A handover authentication using credentials based on chameleon hashing
-
Choi, J., & Jung, S. (2010). A handover authentication using credentials based on chameleon hashing. IEEE Communications Letters, 14(1), 54–56.
-
(2010)
IEEE Communications Letters
, vol.14
, Issue.1
, pp. 54-56
-
-
Choi, J.1
Jung, S.2
-
18
-
-
84856471625
-
Secure and efficient handover authentication based on bilinear pairing functions
-
He, D., Chen, C., Chan, S., et al. (2012). Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communications, 11(1), 48–53.
-
(2012)
IEEE Transactions on Wireless Communications
, vol.11
, Issue.1
, pp. 48-53
-
-
He, D.1
Chen, C.2
Chan, S.3
-
19
-
-
42649096622
-
Media-independent pre-authentication supporting secure interdomain handover optimization
-
Dutta, A., Famolari, D., Das, S., et al. (2008). Media-independent pre-authentication supporting secure interdomain handover optimization. IEEE Wireless Communications, 15(2), 55–64.
-
(2008)
IEEE Wireless Communications
, vol.15
, Issue.2
, pp. 55-64
-
-
Dutta, A.1
Famolari, D.2
Das, S.3
-
20
-
-
77956877430
-
Secure three-party key distribution protocol for fast network access in EAP-based wireless networks
-
Marin-Lopez, R., Pereniguez, F., Bernal, F., et al. (2010). Secure three-party key distribution protocol for fast network access in EAP-based wireless networks. Computer Networks, 54(15), 2651–2673.
-
(2010)
Computer Networks
, vol.54
, Issue.15
, pp. 2651-2673
-
-
Marin-Lopez, R.1
Pereniguez, F.2
Bernal, F.3
-
21
-
-
79960524688
-
Fast and secure reauthentications for 3GPP subscribers during WiMAX-WLAN handovers
-
Shidhani, A., & Leung, V. (2011). Fast and secure reauthentications for 3GPP subscribers during WiMAX-WLAN handovers. IEEE Transactions on Dependable and Secure, 8(5), 699–713.
-
(2011)
IEEE Transactions on Dependable and Secure
, vol.8
, Issue.5
, pp. 699-713
-
-
Shidhani, A.1
Leung, V.2
-
22
-
-
84879415989
-
A fast authentication scheme for WiMAX-WLAN vertical handover. Wireless Personal Communications
-
Huang, K., Chi, K., Wang, J. et al. (2012). A fast authentication scheme for WiMAX-WLAN vertical handover. Wireless Personal Communications, September 2012. doi:10.1007/s11277-012-0828-7.
-
(2012)
September
, pp. 2012
-
-
Huang, K.1
Chi, K.2
Wang, J.3
-
23
-
-
78650029126
-
Cryptanalysis of a handover authentication scheme using credentials based on chameleon hashing
-
Yoon, E., Khan, M. K., & Yoo, K. (2010). Cryptanalysis of a handover authentication scheme using credentials based on chameleon hashing. IEICE Transactions on Information and Systems, E93–D(12), 3400–3402.
-
(2010)
IEICE Transactions on Information and Systems
, vol.E93–D
, Issue.12
, pp. 3400-3402
-
-
Yoon, E.1
Khan, M.K.2
Yoo, K.3
-
24
-
-
84910019915
-
Wi-Fi-WiMAX Interworking. WMF-T37-010-R016v01
-
WiMAX Forum. (2010). Wi-Fi-WiMAX Interworking. WMF-T37-010-R016v01, November 2010.
-
(2010)
November
, pp. 2010
-
-
Forum, W.M.A.X.1
-
25
-
-
84910001543
-
Network architecture-detailed protocols and procedures. WMF-T33-001-R015v01
-
WiMAX Forum. (2009). Network architecture-detailed protocols and procedures. WMF-T33-001-R015v01. November 2009.
-
(2009)
November
, pp. 2009
-
-
Forum, W.M.A.X.1
-
26
-
-
84909997824
-
IEEE standard 802.16m-2011: Air interface for broadband wireless access systems—Amendment 3: Advanced Air Interface. IEEE, technical report
-
IEEE 802.16 Work Group. (2011). IEEE standard 802.16m-2011: Air interface for broadband wireless access systems—Amendment 3: Advanced Air Interface. IEEE, technical report, May 2011.
-
(2011)
May
, pp. 2011
-
-
-
27
-
-
84910019914
-
-
AVISPA v1.1
-
AVISPA v1.1. http://www.avispa-project.org/.
-
-
-
|