Analysis of Attacks in Authentication Protocol of IEEE 802.16e
暂无分享,去创建一个
[1] Cai Yi,et al. Re-Authentication Design for PKMv2 of IEEE 802.16e Standard , 2010, 2010 International Conference on Computational Intelligence and Software Engineering.
[2] Chin-Tser Huang,et al. Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions , 2006, 2006 3rd International Symposium on Wireless Communication Systems.
[3] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[4] Mir Md. Saki Kowsar,et al. Shared key vulnerability in IEEE 802.16e: Analysis & solution , 2010, 2010 13th International Conference on Computer and Information Technology (ICCIT).
[5] Chris Mitchell,et al. Security defects in CCITT recommendation X.509: the directory authentication framework , 1990, CCRV.
[6] Rakesh Kumar Jha,et al. A Journey on WiMAX and its Security Issues , 2010 .
[7] Rajesh Srivastava,et al. Prevention of Security Threats in IEEE 802.16 Standards , 2011 .
[8] Michel Barbeau. WiMax/802.16 threat analysis , 2005, Q2SWinet '05.
[9] Martín Abadi,et al. Prudent engineering practice for cryptographic protocols , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[10] Fan Yang. Comparative Analysis on TEK Exchange between PKMv1 and PKMV2 for WiMAX , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.
[11] Yi Qu,et al. Analysis on mobile WiMAX security , 2009, 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH).
[12] David Johnston,et al. Overview of IEEE 802.16 security , 2004, IEEE Security & Privacy Magazine.
[13] Pero Latkoski,et al. IEEE 802.16 Security Issues: A Survey , 2008 .