-
1
-
-
84914678131
-
-
Internet Engineering Task Force. Handover keying working group (hokey wg). (Available from Accessed 06 August
-
Internet Engineering Task Force. Handover keying working group (hokey wg). (Available from: http://www.ietf.org/html.charters/hokey-charter.html) [Accessed 06 August 2012].
-
(2012)
-
-
-
2
-
-
84914678130
-
-
3rd Generation Partnership Project (3GPP). (Available from Accessed 06 August
-
3rd Generation Partnership Project (3GPP). (Available from: http://www.3gpp.org/) [Accessed 06 August 2012].
-
(2012)
-
-
-
3
-
-
84914678129
-
-
Institute of Electrical and Electronics Engineers. IEEE 802.21/D8.0 Draft Standard for Local and Metropolitan Area Networks: Media Independent Handover Services
-
Institute of Electrical and Electronics Engineers. IEEE 802.21/D8.0 Draft Standard for Local and Metropolitan Area Networks: Media Independent Handover Services, 2007.
-
(2007)
-
-
-
5
-
-
84865496287
-
A formally verified AKA protocol for vertical handover in heterogeneous environments using Casper/FDR
-
Aiash M, Mapp G, Lasebae A, Phan R, Loo J. A formally verified AKA protocol for vertical handover in heterogeneous environments using Casper/FDR. EURASIP Journal on Wireless Communications and Networking 2012; 2012:57-80.
-
(2012)
EURASIP Journal on Wireless Communications and Networking
, pp. 57-80
-
-
Aiash, M.1
Mapp, G.2
Lasebae, A.3
Phan, R.4
Loo, J.5
-
8
-
-
9144272434
-
Secure service and network framework for mobile ethernet
-
Masahiro K, Mariko Y, Ryoji O, Shinsaku K, Tanaka T. Secure service and network framework for mobile ethernet. Wireless Personal Communications 2004; 29:161-190.
-
(2004)
Wireless Personal Communications
, vol.29
, pp. 161-190
-
-
Masahiro, K.1
Mariko, Y.2
Ryoji, O.3
Shinsaku, K.4
Tanaka, T.5
-
9
-
-
77953197726
-
Next generation networks (NGNs)
-
Chao H-C, Zeadally S, Chen Y-S, Martinez G,Wang R-C. Next Generation Networks (NGNs). International Journal of Communication Systems 2010; 23:691-693. DOI: 10.1002/dac.1144.
-
(2010)
International Journal of Communication Systems
, vol.23
, pp. 691-693
-
-
Chao, H.-C.1
Zeadally, S.2
Chen, Y.-S.3
Martinez, G.4
Wang, R.-C.5
-
10
-
-
0003777431
-
-
PEARSON Ltd.: Edinburgh Gate, UK
-
Ryan P, Schneider S, Goldsmith M, Lowe G, Roscoe AW. The Modelling and Analysis of Security Protocols. PEARSON Ltd.: Edinburgh Gate, UK, 2010.
-
(2010)
The Modelling and Analysis of Security Protocols
-
-
Ryan, P.1
Schneider, S.2
Goldsmith, M.3
Lowe, G.4
Roscoe, A.W.5
-
11
-
-
0029484376
-
Modelling and verifying key-exchange protocols using CSP and FDR
-
County Kerry, Ireland
-
Roscoe AW. Modelling and verifying key-exchange protocols using CSP and FDR. 8th IEEE Computer Security Foundations Workshop, County Kerry, Ireland, 1995; 98-107.
-
(1995)
8th IEEE Computer Security Foundations Workshop
, pp. 98-107
-
-
Roscoe, A.W.1
-
13
-
-
0007928023
-
-
Formal systems (Europe) Ltd.: Failures-Divergence Refinement Available from Accessed 19 August
-
Formal systems (Europe) Ltd.: Failures-Divergence Refinement. FDR2 User Manual. (Available from: http://www. fsel.com/documentation/fdr2/fdr2manual.pdf) [Accessed 19 August 2011].
-
(2011)
FDR2 User Manual
-
-
-
15
-
-
80755177393
-
An End-to-end QoS framework for 4G mobile heterogeneous environments
-
Diegem, Belgium
-
Almeida M, Corujo D, Sargento S, Jesus V, Aguiar R. An End-to-end QoS framework for 4G mobile heterogeneous environments. OpenNet Workshop (2007), Diegem, Belgium, 2007.
-
(2007)
OpenNet Workshop (2007)
-
-
Almeida, M.1
Corujo, D.2
Sargento, S.3
Jesus, V.4
Aguiar, R.5
-
16
-
-
84866907856
-
A QoS framework for heterogeneous networking
-
London, UK
-
Aiash M, Mapp G, Lasebae A. A QoS framework for heterogeneous networking. ICWN2011, London, UK, 2011.
-
(2011)
ICWN2011
-
-
Aiash, M.1
Mapp, G.2
Lasebae, A.3
-
17
-
-
84914678128
-
-
International Telecommunication Union (ITU-T), Global Information Infrastructure. Internet protocol aspects and next generation networks Y.140.1
-
International Telecommunication Union (ITU-T), Global Information Infrastructure. Internet protocol aspects and next generation networks, 2004. Y.140.1.
-
(2004)
-
-
-
18
-
-
84879874885
-
The intermon simulation framework
-
Budapest, Hungary
-
BartoliM, Baumgartner F, Brandauer C, Braun T, Kardos S, Orl F, ScheideggerM, Seger J. The intermon simulation framework. In Proceedings of the Second Inter-Domain Performance and Simulation Workshop, Budapest, Hungary, 2004.
-
(2004)
Proceedings of the Second Inter-Domain Performance and Simulation Workshop
-
-
Bartoli, M.1
Baumgartner, F.2
Brandauer, C.3
Braun, T.4
Kardos, S.5
Orl, F.6
Scheidegger, M.7
Seger, J.8
-
20
-
-
84914678125
-
-
The LTE/LTE Advanced Guidea semi-annual publication on LTE/LTE Advanced. (Available from
-
The LTE/LTE Advanced Guidea semi-annual publication on LTE/LTE Advanced. (Available from: http://lteportal. com/LTEBusinessGuide).
-
-
-
-
23
-
-
84881388540
-
Strong roaming authentication technique for wireless and mobile networks
-
Early view of an online version
-
He D, Chen C, Chan S, Bu J. Strong roaming authentication technique for wireless and mobile networks. International Journal of Communication Systems 2012. DOI: 10.1002/dac.1387. Early view of an online version.
-
(2012)
International Journal of Communication Systems
-
-
He, D.1
Chen, C.2
Chan, S.3
Bu, J.4
-
24
-
-
79952059658
-
Lightweight and provably secure user authentication with anonymity for the global mobility network
-
Chen C, He D, Chan S, Bu J, Gao Y, Fan R. Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems 2010; 24:347-362. DOI: 10.1002/dac.1158.
-
(2010)
International Journal of Communication Systems
, vol.24
, pp. 347-362
-
-
Chen, C.1
He, D.2
Chan, S.3
Bu, J.4
Gao, Y.5
Fan, R.6
-
25
-
-
84855301449
-
A new authenticated key agreement for session initiation protocol
-
Qi X. A new authenticated key agreement for session initiation protocol. International Journal of Communication Systems 2011; 25:47-54. DOI: 10.1002/dac.1286.
-
(2011)
International Journal of Communication Systems
, vol.25
, pp. 47-54
-
-
Qi, X.1
-
26
-
-
78649706743
-
CaTBUA: Context-aware ticket-based binding update authentication protocol for trust-enabled mobile networks
-
You I, Lee J-H, Kim B, Ilsun Y, Jong-Hyouk L, Bonam K. caTBUA: context-aware ticket-based binding update authentication protocol for trust-enabled mobile networks. International Journal of Communication Systems 2010; 23:1382-1404. DOI: 10.1002/dac.1113.
-
(2010)
International Journal of Communication Systems
, vol.23
, pp. 1382-1404
-
-
You, I.1
Lee, J.-H.2
Kim, B.3
Ilsun, Y.4
Jong-Hyouk, L.5
Bonam, K.6
-
32
-
-
1842853611
-
-
draft-riegel-tuexen-mobile-sctp-05.txt
-
Riegel M, Tuexen M. Mobile SCTP, 2005. draft-riegel-tuexen-mobile-sctp-05.txt.
-
(2005)
Mobile SCTP
-
-
Riegel, M.1
Tuexen, M.2
-
33
-
-
4544224182
-
Scalable mobile ethernet and fast vertical handover
-
Atlanta, Georgia
-
Kuroda M, Inoue M, Okubo A, Sakakura T, Shimizu K, Adachi F. Scalable mobile ethernet and fast vertical handover. IEEE Wireless Communications and Networking Conference, Atlanta, Georgia, 2004; 659-664.
-
(2004)
IEEE Wireless Communications and Networking Conference
, pp. 659-664
-
-
Kuroda, M.1
Inoue, M.2
Okubo, A.3
Sakakura, T.4
Shimizu, K.5
Adachi, F.6
-
35
-
-
85013734607
-
Bulletproof wireless security: GSM, UMTS, 802.11 and ad hoc security
-
Oxford
-
Chandra P. Bulletproof wireless security: GSM, UMTS, 802.11 and ad hoc security, Newnes. Oxford, 2005. 129-158, 2005.
-
(2005)
Newnes
, vol.2005
, pp. 129-158
-
-
Chandra, P.1
-
36
-
-
77955410807
-
Providing security in 4G systems: Unveiling the challenges
-
Barcelona, Spain May 9-15
-
Aiash M, Mapp G, Lasebae A, Phan R. Providing security in 4G systems: Unveiling the challenges. AICT 2010, Barcelona, Spain, 2010; 439-444. May 9-15, 2010.
-
(2010)
AICT 2010
, pp. 439-444
-
-
Aiash, M.1
Mapp, G.2
Lasebae, A.3
Phan, R.4
-
38
-
-
84900582835
-
A survey on authentication and key agreement protocols in heterogeneous networks
-
Aiash M, Mapp G, Lasebae A, Phan R. A survey on authentication and key agreement protocols in heterogeneous networks. International Journal of Network Security & Its Applications (IJNSA) 2012; 4(4):199-2014.
-
(2012)
International Journal of Network Security & Its Applications (IJNSA
, vol.4
, Issue.4
, pp. 199-2014
-
-
Aiash, M.1
Mapp, G.2
Lasebae, A.3
Phan, R.4
-
40
-
-
13244299564
-
-
June Request for Comments: 3748
-
Aboba B, Blunk L, Vollbrecht J, Carlson J, Levkowetz H. Extensible Authentication Protocol (EAP), June 2004. Request for Comments: 3748.
-
(2004)
Extensible Authentication Protocol (EAP)
-
-
Aboba, B.1
Blunk, L.2
Vollbrecht, J.3
Carlson, J.4
Levkowetz, H.5
|