Authentication and Billing Protocols for the Integration of WLAN and 3G Networks
暂无分享,去创建一个
[1] Dan Simon,et al. PPP EAP TLS Authentication Protocol , 1999, RFC.
[2] Huseyin Selcuk Ozturk,et al. Evaluation of Secure 802.1X Port-Based Network Access Authentication Over 802.11 Wireless Local Area Networks , 2003 .
[3] Allan C. Rubens,et al. Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.
[4] R. Venkateswaran,et al. Virtual Private Networks , 2003, Hands on Hacking.
[5] William A. Arbaugh,et al. Your 80211 wireless network has no clothes , 2002, IEEE Wirel. Commun..
[6] Lein Harn,et al. Authentication protocols with nonrepudiation services in personal communication systems , 1999, IEEE Communications Letters.
[7] John Ioannidis,et al. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.
[8] Larry J. Blunk,et al. PPP Extensible Authentication Protocol (EAP) , 1998, RFC.
[9] Leon Gommans,et al. Generic AAA Architecture , 2000, RFC.
[10] Kyung-Ah Shim. Cryptanalysis of mutual authentication and key exchange for low power wireless communications , 2003, IEEE Communications Letters.
[11] Reuven Cohen,et al. On the cost of virtual private networks , 2000, TNET.
[12] Tai-Yun Kim,et al. Temporary Mobile User Certificate for Mobile Information Services in UMTS (Special Issue on Personal, Indoor and Mobile Radio Communications) , 2000 .
[13] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[14] Yuh-Min Tseng. Robust generalized MQV key agreement protocol without using one-way hash functions , 2002, Comput. Stand. Interfaces.
[15] Hung-Yu Chien,et al. On the Security of Methods for Protecting Password Transmission , 2001, Informatica.
[16] Seung-Jae Han,et al. Integration of 802.11 and third-generation wireless data networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[17] CORPORATE NIST. The digital signature standard , 1992, CACM.
[18] N. K. Shankaranarayanan,et al. Integrating wireless LAN and cellular data for the enterprise , 2003, IEEE Internet Computing.
[19] Roland Schmitz,et al. Secure interoperation between 2G and 3G mobile radio networks , 2000 .
[20] Jouni Mikkonen,et al. Wireless LAN access network architecture for mobile operators , 2001 .
[21] Simon Blake-Wilson,et al. EAP Tunneled TLS Authentication Protocol (EAP-TTLS) , 2004 .
[22] Iakovos S. Venieris,et al. Introduction of the Asymmetric Cryptography in GSM, GPRS, UMTS, and Its Public Key Infrastructure Integration , 2003, Mob. Networks Appl..
[23] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.