Privacy preserving mutual authentication in WiMAX
暂无分享,去创建一个
[1] David Johnston,et al. Overview of IEEE 802.16 security , 2004, IEEE Security & Privacy Magazine.
[2] Chung-Horng Lung,et al. Measuring and Analyzing WiMAX Security and QoS in Testbed Experiments , 2011, 2011 IEEE International Conference on Communications (ICC).
[3] Michel Barbeau. WiMax/802.16 threat analysis , 2005, Q2SWinet '05.
[4] Heba Kamal Aslan,et al. WiMax Security , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).
[5] Jie Huang,et al. Secure Mutual Authentication Protocols for Mobile Multi-Hop Relay WiMAX Networks against Rogue Base/Relay Stations , 2011, 2011 IEEE International Conference on Communications (ICC).
[6] Songwu Lu,et al. Securing a Wireless World , 2006, Proceedings of the IEEE.
[7] Mahmoud Al-Qutayri,et al. Security and Privacy of Intelligent VANETs , 2010 .
[8] Raheel M. Hashmi,et al. Towards secure wirelessMAN: Revisiting and evaluating authentication in WiMAX , 2011, International Conference on Computer Networks and Information Technology.
[9] Yi Yang,et al. Toward Wimax Security , 2009, 2009 International Conference on Computational Intelligence and Software Engineering.
[10] Y. Lee,et al. Design of hybrid authentication scheme and key distribution for mobile multi-hop relay in IEEE 802.16j , 2009, EATIS.
[11] Masood Ahmad,et al. A Review of Some Security Aspects of WiMAX and Converged Network , 2010, 2010 Second International Conference on Communication Software and Networks.
[12] Sherali Zeadally,et al. A Proposed Authentication Protocol for Mobile Users of WiMAX Networks , 2010, 2010 3rd International Conference on Human-Centric Computing.
[13] Yi Qu,et al. Analysis on mobile WiMAX security , 2009, 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH).
[14] Srilekha Mudumbai,et al. Certificate-based authorization policy in a PKI environment , 2003, TSEC.
[15] Adnan Shahid Khan,et al. Efficient Distributed Authentication Key Scheme for Multi-hop Relay In IEEE 802.16j Network , 2010 .
[16] Brijesh Kumar Chaurasia,et al. Infrastructure Aided Privacy Preserving-Authentication in VANETs , 2010, ISA.