-
1
-
-
84936800836
-
-
ETSI TS 102 689 V1.1.2, Machine-to-Machine communications (M2M); M2M service requirements, 2011
-
ETSI TS 102 689 V1.1.2, Machine-to-Machine communications (M2M); M2M service requirements, 2011.
-
-
-
-
2
-
-
84936800837
-
-
GPP TR 23.888 V1.4.0. System Improvements for Machine-Type Communications, August 2011
-
3GPP TR 23.888 V1.4.0. System Improvements for Machine-Type Communications, August 2011.
-
-
-
-
3
-
-
84936800838
-
-
(Available from:) Accessed on 16 April 2012
-
(Available from: http://www.3gpp.org/) Accessed on 16 April 2012.
-
-
-
-
5
-
-
79953785474
-
GRS: The green, reliability, and security of emerging machine to machine communications
-
Lu RX, Li X, Liang XH, Shen XM, Lin XD,. GRS: The green, reliability, and security of emerging machine to machine communications. IEEE Communications Magazine 2011; 49 (4): 28-35.
-
(2011)
IEEE Communications Magazine
, vol.49
, Issue.4
, pp. 28-35
-
-
Lu, R.X.1
Li, X.2
Liang, X.H.3
Shen, X.M.4
Lin, X.D.5
-
6
-
-
84859790284
-
Moving 2 mishap: M2M's impact on privacy and safety
-
Bailey DA,. Moving 2 mishap: M2M's impact on privacy and safety. IEEE Security and Privacy 2012; 10 (1): 84-87.
-
(2012)
IEEE Security and Privacy
, vol.10
, Issue.1
, pp. 84-87
-
-
Bailey, D.A.1
-
7
-
-
79953793010
-
Toward ubiquitous massive accesses in 3GPP machine-to-machine communications
-
Lien SY, Chen KC, Lin YH,. Toward ubiquitous massive accesses in 3GPP machine-to-machine communications. IEEE Communications Magazine 2011; 49 (4): 66-74.
-
(2011)
IEEE Communications Magazine
, vol.49
, Issue.4
, pp. 66-74
-
-
Lien, S.Y.1
Chen, K.C.2
Lin, Y.H.3
-
9
-
-
84858132895
-
Machine type communications in 3GPP networks: Potential, challenges, and solutions
-
Taleb T, Kunz A,. Machine type communications in 3GPP networks: potential, challenges, and solutions. IEEE Communications Magazine 2012; 50 (3): 178-184.
-
(2012)
IEEE Communications Magazine
, vol.50
, Issue.3
, pp. 178-184
-
-
Taleb, T.1
Kunz, A.2
-
10
-
-
84936800839
-
-
3GPP TR 33.868 V0.5.0. Security aspects of Machine-Type Communications, July 2011
-
3GPP TR 33.868 V0.5.0. Security aspects of Machine-Type Communications, July 2011.
-
-
-
-
11
-
-
78651592040
-
An individual and group authentication model for wireless network services
-
Ngo HH, Wu XP, Le PD, Srinivasan B,. An individual and group authentication model for wireless network services. JCIT: Journal of Convergence Information Technology 2010; 5 (1): 82-94.
-
(2010)
JCIT: Journal of Convergence Information Technology
, vol.5
, Issue.1
, pp. 82-94
-
-
Ngo, H.H.1
Wu, X.P.2
Le, P.D.3
Srinivasan, B.4
-
12
-
-
84856695571
-
Group-based authentication and key agreement
-
Chen YW, Wang JT, Chi KH, Tseng CC,. Group-based authentication and key agreement. Wireless Personal Communications 2010; 62 (4): 965-979.
-
(2010)
Wireless Personal Communications
, vol.62
, Issue.4
, pp. 965-979
-
-
Chen, Y.W.1
Wang, J.T.2
Chi, K.H.3
Tseng, C.C.4
-
13
-
-
47049127732
-
-
In WIMOB '07 Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications IEEE Computer Society Washington, DC, USA
-
Aboudagga N, Quisquater JJ, Eltoweissy M,. Group authentication protocol for mobile networks, In WIMOB '07 Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications IEEE Computer Society Washington, DC, USA, 2007; 1-9.
-
(2007)
Group Authentication Protocol for Mobile Networks
, pp. 1-9
-
-
Aboudagga, N.1
Quisquater, J.J.2
Eltoweissy, M.3
-
14
-
-
84870489156
-
A novel group-based handover authentication scheme with privacy preservation for mobile WiMAX networks
-
Fu A, Lan S, Huang B, Zhu Z, Zhang Y,. A novel group-based handover authentication scheme with privacy preservation for mobile WiMAX networks. IEEE Communications Letters 2012; 16 (11): 1744-1747.
-
(2012)
IEEE Communications Letters
, vol.16
, Issue.11
, pp. 1744-1747
-
-
Fu, A.1
Lan, S.2
Huang, B.3
Zhu, Z.4
Zhang, Y.5
-
15
-
-
84936800840
-
-
3GPP TS 21.133 V4.1.0, 3G Security;Security Threats and Requirements, 2001
-
3GPP TS 21.133 V4.1.0, 3G Security;Security Threats and Requirements, 2001.
-
-
-
-
17
-
-
17144430885
-
Security analysis and enhancements of 3GPP authentication and key agreement protocol
-
Zhang MX, Fang YG,. Security analysis and enhancements of 3GPP authentication and key agreement protocol. IEEE Transactions on Wireless Communications 2005; 4 (2): 734-742.
-
(2005)
IEEE Transactions on Wireless Communications
, vol.4
, Issue.2
, pp. 734-742
-
-
Zhang, M.X.1
Fang, Y.G.2
-
18
-
-
83655165222
-
S-AKA: A provable and secure authentication key agreement protocol for UMTS networks
-
Huang YL, Shen CY, Shieh SW,. S-AKA: a provable and secure authentication key agreement protocol for UMTS networks. IEEE Transactions on Vehicular Technology 2011; 60 (9): 4509-4519.
-
(2011)
IEEE Transactions on Vehicular Technology
, vol.60
, Issue.9
, pp. 4509-4519
-
-
Huang, Y.L.1
Shen, C.Y.2
Shieh, S.W.3
-
19
-
-
73149084427
-
A cocktail protocol with the authentication and key agreement on the UMTS
-
Ou HH, Hwang MS, Jan JK,. A cocktail protocol with the authentication and key agreement on the UMTS. Journal Of Systems And Software 2010; 83 (2): 316-325.
-
(2010)
Journal of Systems and Software
, vol.83
, Issue.2
, pp. 316-325
-
-
Ou, H.H.1
Hwang, M.S.2
Jan, J.K.3
-
20
-
-
67650870141
-
TK-AKA: Using temporary key on authentication and key agreement protocol on UMTS
-
Ou HH, Lin IC, Hwang MS, Jan JK,. TK-AKA: using temporary key on authentication and key agreement protocol on UMTS. International Journal of Network Management 2009; 19 (4): 291-303.
-
(2009)
International Journal of Network Management
, vol.19
, Issue.4
, pp. 291-303
-
-
Ou, H.H.1
Lin, I.C.2
Hwang, M.S.3
Jan, J.K.4
-
21
-
-
79953899288
-
On the security of an enhanced UMTS authentication and key agreement protocol
-
Hwang MS, Chong SK, Ou HH,. On the security of an enhanced UMTS authentication and key agreement protocol. European Transactions on Telecommunications 2011; 22 (3): 1541-8251.
-
(2011)
European Transactions on Telecommunications
, vol.22
, Issue.3
, pp. 1541-8251
-
-
Hwang, M.S.1
Chong, S.K.2
Ou, H.H.3
-
22
-
-
33748634936
-
An improvement for authentication protocol in third-generation wireless networks
-
Zhang Y, Fujise M,. An improvement for authentication protocol in third-generation wireless networks. IEEE Transactions on Wireless Communications 2006; 5 (9): 2348-2352.
-
(2006)
IEEE Transactions on Wireless Communications
, vol.5
, Issue.9
, pp. 2348-2352
-
-
Zhang, Y.1
Fujise, M.2
-
23
-
-
84879786156
-
Extension of an efficient 3GPP authentication and key agreement protocol
-
Lee CC, Chen CL, Ou HH, Chen LA,. Extension of an efficient 3GPP authentication and key agreement protocol. Wireless Personal Communications 2011; 68 (3): 861-872.
-
(2011)
Wireless Personal Communications
, vol.68
, Issue.3
, pp. 861-872
-
-
Lee, C.C.1
Chen, C.L.2
Ou, H.H.3
Chen, L.A.4
-
24
-
-
84936800841
-
-
3GPP TS 33.401 V11.1.0. 3GPP System Architecture Evolution (SAE); Security architecture, September 2011
-
3GPP TS 33.401 V11.1.0. 3GPP System Architecture Evolution (SAE); Security architecture, September 2011.
-
-
-
-
25
-
-
84862217559
-
Security issues on machine to machine communications
-
Lai CZ, Li H, Zhang YY, Cao J,. Security issues on machine to machine communications. KSII Transactions On Internet And Information Systems 2012; 6 (2): 498-514.
-
(2012)
KSII Transactions on Internet and Information Systems
, vol.6
, Issue.2
, pp. 498-514
-
-
Lai, C.Z.1
Li, H.2
Zhang, Y.Y.3
Cao, J.4
-
26
-
-
40749151471
-
Adaptive hysteresis using mobility correlation for fast handover
-
Lee L, Kim D, Chung B, Yoon H,. Adaptive hysteresis using mobility correlation for fast handover. IEEE Communications Letters 2008; 12 (2): 152-154.
-
(2008)
IEEE Communications Letters
, vol.12
, Issue.2
, pp. 152-154
-
-
Lee, L.1
Kim, D.2
Chung, B.3
Yoon, H.4
-
27
-
-
78649411023
-
-
In Proc. 2010 IEEE VTC - Fall, Ottawa, Canada
-
Choi HH, Lim JB, Hwang H, Jang K,. Optimal handover decision algorithm for throughput enhancement in cooperative cellular networks, In Proc. 2010 IEEE VTC-Fall, Ottawa, Canada; 1-5.
-
Optimal Handover Decision Algorithm for Throughput Enhancement in Cooperative Cellular Networks
, pp. 1-5
-
-
Choi, H.H.1
Lim, J.B.2
Hwang, H.3
Jang, K.4
-
28
-
-
0004282359
-
-
(Available from:) Accessed on 16 April 2012
-
Calhoun P, Loughney J, Guttman E, Zorn G, Arkko J,. Diameter Base Protocol. (Available from: http://www.ietf.org/rfc/rfc3588.txt) Accessed on 16 April 2012.
-
Diameter Base Protocol
-
-
Calhoun, P.1
Loughney, J.2
Guttman, E.3
Zorn, G.4
Arkko, J.5
-
29
-
-
0033356116
-
A survey of security issues in multicast communications
-
Moyer MJ, Rao JR, Rohatgi P,. A survey of security issues in multicast communications. IEEE Network 1999; 13 (6): 12-23.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 12-23
-
-
Moyer, M.J.1
Rao, J.R.2
Rohatgi, P.3
-
30
-
-
0345565893
-
A survey of key management for secure group communication
-
Rafaeli S, Hutchison D,. A survey of key management for secure group communication. ACM Computing Surveys 2003; 35 (3): 309-329.
-
(2003)
ACM Computing Surveys
, vol.35
, Issue.3
, pp. 309-329
-
-
Rafaeli, S.1
Hutchison, D.2
-
31
-
-
84888857761
-
-
(Available from:) Accessed on 15 March 2012
-
AVISPA v1.1 User Manual 2006, (Available from: http://avispa-project.org/) Accessed on 15 March 2012.
-
AVISPA v1.1 User Manual 2006
-
-
|