-
2
-
-
84904979683
-
What Will 5g Be?
-
J. Andrews et al., "What Will 5g Be?," IEEE JSAC, vol. 32, no. 6, 2014, pp. 1065-82.
-
(2014)
IEEE JSAC
, vol.32
, Issue.6
, pp. 1065-1082
-
-
Andrews, J.1
-
3
-
-
84900317816
-
A Survey of Software-Defined Networking: Past, Present, and Future of Programmable Networks
-
Feb.
-
B. A. A. Nunes et al., "A Survey of Software-Defined Networking: Past, Present, and Future of Programmable Networks," IEEE Commun. Surveys and Tutorials, vol. 99, Feb. 2014, pp. 1-18.
-
(2014)
IEEE Commun. Surveys and Tutorials
, vol.99
, pp. 1-18
-
-
Nunes, B.A.A.1
-
4
-
-
78649307331
-
Blueprint for Introducing Innovation into Wireless Mobile Networks
-
K.-K. Yap et al., "Blueprint for Introducing Innovation into Wireless Mobile Networks," Pro. ACM SIGCOMM Wksp., 2010, pp. 25-32.
-
Pro. ACM SIGCOMM Wksp., 2010
, pp. 25-32
-
-
Yap, K.-K.1
-
5
-
-
84856471625
-
Secure and Efficient Handover Authentication based on Bilinear Pairing Functions
-
Jan.
-
D. He et al., "Secure and Efficient Handover Authentication based on Bilinear Pairing Functions," IEEE Trans. Wireless Commun., vol. 11, no. 1, Jan. 2012, pp. 48-53.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.1
, pp. 48-53
-
-
He, D.1
-
6
-
-
75449110407
-
A Handover Authentication Using Credentials Based on Chameleon Hashing
-
J. Choi and S. Jung. "A Handover Authentication Using Credentials Based on Chameleon Hashing," IEEE Commun. Letters, vol. 14, no. 1, 2010, pp. 54-56.
-
(2010)
IEEE Commun. Letters
, vol.14
, Issue.1
, pp. 54-56
-
-
Choi, J.1
Jung, S.2
-
7
-
-
84862821633
-
A Simple and Robust Handover Authentication between HeNB and eNB in LTE Networks
-
J. Cao et al., "A Simple and Robust Handover Authentication between HeNB and eNB in LTE Networks," Computer Networks, vol. 56, no. 8, 2012, pp. 2119-31.
-
(2012)
Computer Networks
, vol.56
, Issue.8
, pp. 2119-2131
-
-
Cao, J.1
-
8
-
-
77953311942
-
CapAuth: A Capability-Based Handover Scheme
-
L. Cai, S. Machiraju, and H. Chen, "CapAuth: A Capability- Based Handover Scheme," Proc. INFOCOM, 2010, pp. 1-5.
-
Proc. INFOCOM, 2010
, pp. 1-5
-
-
Cai, L.1
Machiraju, S.2
Chen, H.3
-
9
-
-
85067759863
-
-
Higher Education Press
-
L. Chen, J. Ji, and Z. Zhang, Wireless Security: Models, Threats, and Solutions, Higher Education Press, 2013.
-
(2013)
Wireless Security: Models, Threats, and Solutions
-
-
Chen, L.1
Ji, J.2
Zhang, Z.3
-
10
-
-
85067782347
-
-
3GPP TS 33.401 V11.5.0. 3rd Generation Partnership Project; Technical Specification Group Service and System Aspects; 3GPP System Architecture Evolution (SAE); Security Architecture (Rel 11), 2012
-
3GPP TS 33.401 V11.5.0. 3rd Generation Partnership Project; Technical Specification Group Service and System Aspects; 3GPP System Architecture Evolution (SAE); Security Architecture (Rel 11), 2012.
-
-
-
-
11
-
-
84873910697
-
Security and Efficiency in Roaming Services for Wireless Networks: Challenges, Approaches, and Prospects
-
Feb.
-
D. He et al., "Security and Efficiency in Roaming Services for Wireless Networks: Challenges, Approaches, and Prospects," IEEE Commun. Mag., vol. 51, no. 2, Feb. 2013, pp. 142-50.
-
(2013)
IEEE Commun. Mag.
, vol.51
, Issue.2
, pp. 142-150
-
-
He, D.1
-
12
-
-
77958096949
-
Non-Cryptographic Authentication and Identification in Wireless Networks
-
Oct.
-
K. Zeng, K. Govindan, and P. Mohapatra, "Non-Cryptographic Authentication and Identification in Wireless Networks," IEEE Wireless Commun., vol. 17, no. 5, Oct. 2010, pp. 56-62.
-
(2010)
IEEE Wireless Commun.
, vol.17
, Issue.5
, pp. 56-62
-
-
Zeng, K.1
Govindan, K.2
Mohapatra, P.3
-
14
-
-
84883471155
-
On Controller Performance in Software-Defined Networks
-
A. Tootoonchian et al., "On Controller Performance in Software-Defined Networks," Proc. HotICE, 2012.
-
Proc. HotICE, 2012
-
-
Tootoonchian, A.1
|