暂无分享,去创建一个
Perumal Dananjayan | Ramalingam Shankar | Timothy Rajkumar | P. Dananjayan | R. Shankar | T. Rajkumar
[1] Geir M. Køien,et al. Security aspects of 3G-WLAN interworking , 2003, IEEE Commun. Mag..
[2] Wei-Kuan Shih,et al. Practical considerations on end-to-end cellular/PWLAN architecture in support of bilateral roaming , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[3] Simon Blake-Wilson,et al. EAP Tunneled TLS Authentication Protocol (EAP-TTLS) , 2004 .
[4] Kwangjo Kim,et al. 3G-WLAN interworking: security analysis and new authentication and key agreement based on EAP-AKA , 2009, 2009 Wireless Telecommunications Symposium.
[5] Kalle Ahmavaara,et al. Interworking architecture between 3GPP and WLAN systems , 2003, IEEE Commun. Mag..
[6] P. V. G. D. Prasad Reddy,et al. Modified Queue-Based Exponential Rule Scheduler for Improved QOS in OFDMA Systems , 2010 .
[7] ABBAS JAMALIPOUR,et al. Network selection in an integrated wireless LAN and UMTS environment using mathematical modeling and computing techniques , 2005, IEEE Wireless Communications.
[8] J Arkko,et al. Network Working Group Extensible Authentication Protocol Method for Umts Authentication and Key Agreement (eap-aka) , 2004 .
[9] Nokia,et al. Network Working Group Extensible Authentication Protocol Method for Gsm Subscriber Identity Modules (eap-sim) , 2004 .
[10] Apostolis K. Salkintzis,et al. WLAN-GPRS integration for next-generation mobile data networks , 2002, IEEE Wirel. Commun..
[11] Yuh-Min Tseng. USIM-based EAP-TLS authentication protocol for wireless local area networks , 2009, Comput. Stand. Interfaces.
[12] Lei Han,et al. A Threat Analysis of The Extensible Authentication Protocol , 2006 .
[13] Henry Haverinen,et al. Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM) , 2006, RFC.
[14] Dan Simon,et al. PPP EAP TLS Authentication Protocol , 1999, RFC.
[15] Chunming Liu,et al. An improved interworking architecture for UMTS-WLAN tight coupling , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[16] Jari Arkko,et al. Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA') , 2009, RFC.