Perspective security procedures for femtocell backbone
暂无分享,去创建一个
[1] Jeffrey G. Andrews,et al. Femtocell networks: a survey , 2008, IEEE Communications Magazine.
[2] Ronny Yongho Kim,et al. WiMAX femtocell: requirements, challenges, and solutions , 2009, IEEE Communications Magazine.
[3] David Cooper,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.
[4] Donald E. Eastlake rd. Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH) , 2005 .
[5] Brian Korver,et al. The Internet IP Security PKI Profile of IKEv1/ISAKMP, IKEv2, and PKIX , 2007, RFC.
[6] Syed Faraz Hasan,et al. Femtocell versus WiFi - A survey and comparison of architecture and performance , 2009, 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology.
[7] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.
[8] David L. Black,et al. Using Authenticated Encryption Algorithms with the Encrypted Payload of the Internet Key Exchange version 2 (IKEv2) Protocol , 2008, RFC.
[9] Charlie Kaufman,et al. Internet Key Exchange (IKEv2) Protocol , 2005, RFC.
[10] Mats Näslund,et al. The Secure Real-time Transport Protocol (SRTP) , 2004, RFC.