SECURITY V /S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
暂无分享,去创建一个
[1] Dan Forsberg,et al. LTE Security , 2010 .
[2] Hugo Krawczyk,et al. On Travelling Incognito , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.
[3] Jacques Bou Abdo,et al. Ensured confidentiality authentication and key agreement protocol for EPS , 2012, 2012 Symposium on Broadband Networks and Fast Internet (RELABIRA).
[4] Hakima Chaouchi,et al. On the Integration of LTE and Mobile WiMAX Networks , 2010, 2010 Proceedings of 19th International Conference on Computer Communications and Networks.
[5] G. Pujolle,et al. A Trusted Handoff Decision Scheme for the Next Generation Wireless Networks , 2008 .
[6] Russ Housley,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.
[7] Weichao Wang,et al. Homogeneous Security in Heterogeneous Networks: Towards a Generic Security Management Protocol , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[8] G. Pujolle,et al. A distributed trust and reputation model for capacity enhancement in wireless networks , 2008, 2008 1st IFIP Wireless Days.
[9] Ali Al Shidhani. Authentication and key management in heterogeneous wireless networks , 2010 .
[10] Dake He,et al. User authentication scheme based on self-certified public-key for next generation wireless network , 2008, 2008 International Symposium on Biometrics and Security Technologies.
[11] Aboubaker Lasebae,et al. A Survey on Authentication and Key Agreement Protocols in Heterogeneous Networks , 2012, ArXiv.
[12] Yongjun Wang,et al. Security Enhanced Authentication and Key Agreement Protocol for LTE/SAE Network , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.
[13] Jian-Hua Li,et al. Security Protocol Analysis with Improved Authentication Tests , 2006, ISPEC.
[14] David Cooper,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.
[15] Hugo Krawczyk,et al. On travelling incognito [mobile computing] , 1994, Workshop on Mobile Computing Systems and Applications.