Security scheme for 4G wireless systems
暂无分享,去创建一个
Xiaohu Tang | Dake He | Yu Zheng | Lixing Xu | Xiaohu Tang | Yu Zheng | Dake He | Lixing Xu
[1] Vangelis Gazis,et al. Generic system architecture for 4G mobile communications , 2003, The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003-Spring..
[2] HuiSuk Yu,et al. Challenges in the migration to 4G mobile systems , 2003 .
[3] Neil Haller,et al. The S/KEY One-Time Password System , 1995, RFC.
[4] Ed Dawson,et al. Privacy and trusted computing , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..
[5] Kiho Kim,et al. Beyond 3G: vision, requirements, and enabling technologies , 2003, IEEE Commun. Mag..
[6] Alexandru Petrescu,et al. Network mobility in beyond-3G systems , 2003, IEEE Commun. Mag..
[7] Kwangjo Kim,et al. Authentication and payment protocol preserving location privacy in mobile IP , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[8] Roy H. Campbell,et al. A lightweight reconfigurable security mechanism for 3G/4G mobile devices , 2002, IEEE Wirel. Commun..
[9] Joachim Sachs,et al. Ambient networks: an architecture for communication networks beyond 3G , 2004, IEEE Wireless Communications.
[10] C. Perkins,et al. Mobile IP and security issue: an overview , 1999, First IEEE/POPOV Workshop on Internet Technologies and Services. Proceedings (Cat. No.99EX391).
[11] Dooho Choi,et al. Mobile IP and WLAN with AAA authentication protocol using identity-based cryptography , 2003, 10th International Conference on Telecommunications, 2003. ICT 2003..
[12] Kwok-Yan Lam,et al. Mobile IP registration protocol: a security attack and new secure minimal public-key based authentication , 1999, Proceedings Fourth International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN'99).
[13] C. Admas,et al. Profiles and protocols for the Internet Public-Key Infrastructure , 1997, Proceedings of the Sixth IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems.
[14] W. W. Lu,et al. Open wireless architecture - the core to 4G mobile communications , 2003, International Conference on Communication Technology Proceedings, 2003. ICCT 2003..
[15] S. Hui. Challenges in the Migration to 4 G Mobile Systems , 2022 .
[16] Matu-Tarow Noda,et al. Simple and Secure Password Authentication Protocol (SAS) , 2000 .
[17] R. Perlman,et al. An overview of PKI trust models , 1999, IEEE Netw..
[18] Yasushi Yamao,et al. Architecture and Mobile IPv6 extensions supporting mobile networks in mobile communications , 2001, IEEE 54th Vehicular Technology Conference. VTC Fall 2001. Proceedings (Cat. No.01CH37211).
[19] Narumi Yokohama-shi Umeda,et al. Radio access network design concept for the fourth generation mobile communication system , 2000, VTC2000-Spring. 2000 IEEE 51st Vehicular Technology Conference Proceedings (Cat. No.00CH37026).
[20] HanZhen,et al. Hierarchy-distribution combined PKI trust model , 2002, 2002 IEEE Region 10 Conference on Computers, Communications, Control and Power Engineering. TENCOM '02. Proceedings..
[21] Charles E. Perkins,et al. Mobility support in IPv6 , 1996, MobiCom '96.
[22] William T. Polk,et al. Public Key Infrastructures that Satisfy Security Goals , 2003, IEEE Internet Comput..
[23] Hirohito Inagaki,et al. A Password Authentication Method for Contents Communications on the Internet , 1998 .
[24] Alan Kai-Hau Yeung,et al. Challenges in the migration to 4G mobile systems , 2003, IEEE Commun. Mag..