Performance Analysis of Secured Privacy and Key Management Protocol in IEEE 802-16e-2005
暂无分享,去创建一个
[1] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[2] Li Gong,et al. A security risk of depending on synchronized clocks , 1992, OPSR.
[3] M.Y. Javed,et al. S3H: A Secure Seamless and Soft Handover between WiMax and 3G Networks , 2008, 2008 International Conference on Convergence and Hybrid Information Technology.
[4] Toshiaki Tanaka,et al. Security Vulnerabilities and Solutions in Mobile WiMAX , 2007 .
[5] David Johnston,et al. Overview of IEEE 802.16 security , 2004, IEEE Security & Privacy Magazine.
[6] Michel Barbeau. WiMax/802.16 threat analysis , 2005, Q2SWinet '05.
[7] Pin-Han Ho,et al. Authentication Authorization and Accounting (AAA) Schemes in WiMAX , 2006, 2006 IEEE International Conference on Electro/Information Technology.
[8] Chin-Tser Huang,et al. Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions , 2006, 2006 3rd International Symposium on Wireless Communication Systems.
[9] M. Younus Javed,et al. Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005 , 2008, 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing.