Research on Authentication Mechanism of Cognitive Radio Networks Based on Certification Authority
暂无分享,去创建一个
Li Zhu | Huaqing Mao | Li Zhu | Huaqing Mao
[1] Simon Blake-Wilson,et al. EAP Tunneled TLS Authentication Protocol (EAP-TTLS) , 2004 .
[2] Anne-Marie Welling,et al. Work in progress. , 2012, Nursing standard (Royal College of Nursing (Great Britain) : 1987).
[3] Jin-Young Choi,et al. Formal verification of PAP and EAP-MD5 protocols in wireless networks: FDR model checking , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..
[4] Li Zhu,et al. A New Random Number Generate Algorithm for Cognitive Radio Networks , 2010, 2010 International Conference on Computational Intelligence and Software Engineering.
[5] Larry J. Blunk,et al. PPP Extensible Authentication Protocol (EAP) , 1998, RFC.
[6] Michel Barbeau. WiMax/802.16 threat analysis , 2005, Q2SWinet '05.
[7] Tadanori Mizuno,et al. Evaluation of EAP based Re-authentication Protocol for High-speedVehicular Handover in Cognitive Radio Networks , 2007, 2007 2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications.
[8] Masahiro Kuroda,et al. A Radio-independent Authentication Protocol (EAP-CRP) for Networks of Cognitive Radios , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[9] Hannes Tschofenig,et al. The EAP-PSK Protocol: A Pre-Shared Key Extensible Authentication Protocol (EAP) Method , 2007, RFC.