Traffic Analysis for WiMAX
暂无分享,去创建一个
[1] Brijesh Kumar Chaurasia,et al. Privacy preserving mutual authentication in WiMAX , 2013, Int. J. Inf. Technol. Commun. Convergence.
[2] Li Tu,et al. An Improved Mutual Authentication Scheme in Multi-Hop WiMax Network , 2008, 2008 International Conference on Computer and Electrical Engineering.
[3] Jie Huang,et al. Secure Mutual Authentication Protocols for Mobile Multi-Hop Relay WiMAX Networks against Rogue Base/Relay Stations , 2011, 2011 IEEE International Conference on Communications (ICC).
[4] David Johnston,et al. Overview of IEEE 802.16 security , 2004, IEEE Security & Privacy Magazine.
[5] Michel Barbeau. WiMax/802.16 threat analysis , 2005, Q2SWinet '05.
[6] Raheel M. Hashmi,et al. Towards secure wirelessMAN: Revisiting and evaluating authentication in WiMAX , 2011, International Conference on Computer Networks and Information Technology.
[7] Stuart Jacobs. WiMAX subscriber and mobile station authentication challenges , 2011, IEEE Communications Magazine.
[8] M. Younus Javed,et al. Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005 , 2008, 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing.