FSH scheme for high-speed handover and anti-MITM on mobile computing
暂无分享,去创建一个
[1] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[2] William A. Arbaugh,et al. Improving the latency of 802.11 hand-offs using neighbor graphs , 2004, MobiSys '04.
[3] T. S. Randhawa,et al. Saturation throughput analysis of IEEE 802.11e enhanced distributed coordination function , 2004, IEEE Journal on Selected Areas in Communications.
[4] William A. Arbaugh,et al. An empirical analysis of the IEEE 802.11 MAC layer handoff process , 2003, CCRV.
[5] Troels B. Sørensen,et al. In-Band Interference Effects on UTRA LTE Uplink Resource Block Allocation , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.
[6] M. Kassab,et al. Fast and Secure Handover in WLANs: An Evaluation of the Signaling Overhead , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.
[7] Prashant Krishnamurthy,et al. A QoS-based indoor wireless data network design for VoIP applications , 2001, IEEE 54th Vehicular Technology Conference. VTC Fall 2001. Proceedings (Cat. No.01CH37211).
[8] Rajendra Persaud,et al. Fast Re-authentication for Handovers in Wireless Communication Networks , 2006, Networking.
[9] Bernard Aboba,et al. Extensible Authentication Protocol (EAP) , 2004, RFC.
[10] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[11] Larry J. Blunk,et al. PPP Extensible Authentication Protocol (EAP) , 1998, RFC.
[12] Madjid Nakhjiri,et al. AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility , 2005 .
[13] Henning Schulzrinne,et al. Reducing MAC layer handoff latency in IEEE 802.11 wireless LANs , 2004, MobiWac '04.