Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects
暂无分享,去创建一个
Chun Chen | Jiajun Bu | Daojing He | Sammy Chan | Yan Zhang | Daojing He | Yan Zhang | Chun Chen | Jiajun Bu | Sammy Chan
[1] Bart Preneel,et al. A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks , 2008, WiSec '08.
[2] Xiaoyan Hong,et al. Situation-aware trust architecture for vehicular networks , 2010, IEEE Communications Magazine.
[3] Lidong Chen,et al. Where EAP security claims fail , 2007, QSHINE.
[4] Ari Juels,et al. $evwu Dfw , 1998 .
[5] Chun Chen,et al. Strong roaming authentication technique for wireless and mobile networks , 2013, Int. J. Commun. Syst..
[6] Chun Chen,et al. Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions , 2012, IEEE Transactions on Wireless Communications.
[7] Xiaotie Deng,et al. Universal authentication protocols for anonymous wireless communications , 2010, IEEE Transactions on Wireless Communications.
[8] Chun Chen,et al. Handauth: Efficient Handover Authentication with Conditional Privacy for Wireless Networks , 2013, IEEE Transactions on Computers.
[9] Prasant Mohapatra,et al. Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[10] MohapatraPrasant,et al. Non-cryptographic authentication and identification in wireless networks , 2010 .
[11] Xiaotie Deng,et al. Anonymous and Authenticated Key Exchange for Roaming Networks , 2007, IEEE Transactions on Wireless Communications.
[12] Chun Chen,et al. Privacy-Preserving Universal Authentication Protocol for Wireless Communications , 2011, IEEE Transactions on Wireless Communications.
[13] N. Asokan,et al. Untraceability in mobile networks , 1995, MobiCom '95.