An efficient handover authentication scheme with location privacy preserving for EAP-based wireless networks
暂无分享,去创建一个
[1] Ieee Microwave Theory,et al. IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems Draft Amendment: Management Information Base Extensions , 2007 .
[2] Yi Mu,et al. An efficient anonymous proxy signature scheme with provable security , 2009, Comput. Stand. Interfaces.
[3] Christos Politis,et al. Hybrid multilayer mobility management with AAA context transfer capabilities for all-IP networks , 2004, IEEE Wirel. Commun..
[4] Dengguo Feng,et al. ID-Based Proxy Signature Using Bilinear Pairings , 2005, ISPA Workshops.
[5] Siu-Ming Yiu,et al. Efficient Identity Based Ring Signature , 2005, ACNS.
[6] A. Ramachandran,et al. Computing Cryptographic Algorithms in Portable and Embedded Devices , 2007, 2007 IEEE International Conference on Portable Information Devices.
[7] Guoqiang Bai,et al. Proxy multi-signature scheme: a new type of proxy signature scheme , 2000 .
[8] Antonio F. Gómez-Skarmeta,et al. Privacy-enhanced fast re-authentication for EAP-based next generation network , 2010, Comput. Commun..
[9] Anmin Fu,et al. A Fast Handover Authentication Mechanism Based on Ticket for IEEE 802.16m , 2010, IEEE Communications Letters.
[10] Pin-Han Ho,et al. A Location Privacy Preserving Authentication Scheme in Vehicular Networks , 2008, 2008 IEEE Wireless Communications and Networking Conference.
[11] Costas Lambrinoudakis,et al. Privacy preserving context transfer schemes for 4G networks , 2011, Wirel. Commun. Mob. Comput..
[12] Eun-Jun Yoon,et al. Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing , 2010, IEICE Trans. Inf. Syst..
[13] Anmin Fu,et al. A Privacy Preserving Handover Authentication Scheme for EAP-Based Wireless Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[14] A. M. Abdullah,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .
[15] Larry J. Blunk,et al. PPP Extensible Authentication Protocol (EAP) , 1998, RFC.
[16] Bernard Aboba,et al. Extensible Authentication Protocol (EAP) , 2004, RFC.
[17] Charles E. Perkins,et al. Context Transfer Protocol (CXTP) , 2005, RFC.
[18] Anmin Fu,et al. EKMP: An enhanced key management protocol for IEEE 802.16m , 2011, 2011 IEEE Wireless Communications and Networking Conference.
[19] Souhwan Jung,et al. A handover authentication using credentials based on chameleon hashing , 2010, IEEE Communications Letters.
[20] Wei Ren,et al. SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography , 2007, 2007 IEEE International Conference on Communications.