Selecting transition process for WLAN security
暂无分享,去创建一个
[1] Jenhui Chen,et al. High Performance Wireless Switch Protocol for IEEE 802.11 Wireless Networks , 2005, Mob. Networks Appl..
[2] Jean-Marie Bonnin,et al. Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks , 2005, WMuNeP '05.
[3] Anand R. Prasad,et al. Fast authentication methods for handovers between IEEE 802.11 wireless LANs , 2004, WMASH '04.
[4] Hsiao-Hwa Chen,et al. A call admission control framework for voice over WLANs , 2006, IEEE Wireless Communications.
[5] Yuguang Fang,et al. Mobility Management Strategy Based on User Mobility Patterns in Wireless Networks , 2007, IEEE Transactions on Vehicular Technology.
[6] Yi-Bing Lin,et al. Wireless And Mobile All-IP Networks , 2005 .
[7] Shun-Ren Yang,et al. Dynamic Power Saving Mechanism for 3G UMTS System , 2007, Mob. Networks Appl..
[8] Ai-Chun Pang,et al. A Study on Availability of Mobility Databases , 2004, ICOIN.
[9] Yi-Bing Lin. Performance modeling for mobile telephone networks , 1997 .