Research on the Key Agreement and Authentication of Cognitive Radio Networks
暂无分享,去创建一个
[1] William Allen Simpson,et al. PPP Challenge Handshake Authentication Protocol (CHAP) , 1996, RFC.
[2] Jin-Young Choi,et al. Formal verification of PAP and EAP-MD5 protocols in wireless networks: FDR model checking , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..
[3] Anne-Marie Welling,et al. Work in progress. , 2012, Nursing standard (Royal College of Nursing (Great Britain) : 1987).
[4] Tadanori Mizuno,et al. Evaluation of EAP based Re-authentication Protocol for High-speedVehicular Handover in Cognitive Radio Networks , 2007, 2007 2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications.
[5] Li Zhu,et al. A New Random Number Generate Algorithm for Cognitive Radio Networks , 2010, 2010 International Conference on Computational Intelligence and Software Engineering.
[6] Masahiro Kuroda,et al. A Radio-independent Authentication Protocol (EAP-CRP) for Networks of Cognitive Radios , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[7] Larry J. Blunk,et al. PPP Extensible Authentication Protocol (EAP) , 1998, RFC.
[8] Michel Barbeau. WiMax/802.16 threat analysis , 2005, Q2SWinet '05.
[9] Simon Blake-Wilson,et al. EAP Tunneled TLS Authentication Protocol (EAP-TTLS) , 2004 .
[10] Hannes Tschofenig,et al. The EAP-PSK Protocol: A Pre-Shared Key Extensible Authentication Protocol (EAP) Method , 2007, RFC.