An optimized and secure BUTE - binding update using twofold encryption for next generation IP mobility
暂无分享,去创建一个
[1] Mohamed Othman,et al. Mobility management for IP-based next generation mobile networks: Review, challenge and perspective , 2012, J. Netw. Comput. Appl..
[2] Rosli Salleh,et al. A survey of secure protocols in Mobile IPv6 , 2014, J. Netw. Comput. Appl..
[3] Jianhua Li,et al. A Novel Key Exchange Protocol Based on RSA-OAEP , 2008, 2008 10th International Conference on Advanced Communication Technology.
[4] Javier Carmona-Murillo,et al. Analytical and Experimental Evaluation of Handovers in IPv6 Mobility Management Protocols , 2016, Netw. Protoc. Algorithms.
[5] Hitesh Tewari,et al. Performance analysis of cryptographic protocols on handheld devices , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..
[6] Rosli Salleh,et al. Securing Binding Update in Mobile IPv6 Using Private Key Base Binding Update Protocol , 2012, ArXiv.
[7] Victor Shoup,et al. OAEP Reconsidered , 2002, Journal of Cryptology.
[8] Senthilkumar Mathi,et al. A Secure and Efficient Binding Update Scheme with Decentralized Design for Next Generation IP Mobility , 2015 .
[9] Senthilkumar Mathi,et al. A Tokenized Binding Update Scheme for Next Generation Proxy IP Mobility , 2016 .
[10] Kuinam J. Kim,et al. Improved Authentication of Binding Update Protocol in Mobile IPv6 Networks , 2014, Wirel. Pers. Commun..
[11] Debashis Saha,et al. Implementation and performance evaluation of a mobile IPv6 (MIPv6) simulation model for ns-3 , 2017, Simul. Model. Pract. Theory.
[12] C. K. Shyamala,et al. Adversarial Effect in Distributed Storage Systems , 2016 .
[13] Davide Schipani,et al. The Rabin cryptosystem revisited , 2011, Applicable Algebra in Engineering, Communication and Computing.
[14] Hongke Zhang,et al. Survey on Route Optimization Schemes for Proxy Mobile IPv6 , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[15] Wafaa A. H. Ali Alsalihy,et al. Integrating Identity-Based Encryption in the Return Routability Protocol to Enhance Signal Security in Mobile IPv6 , 2013, Wirel. Pers. Commun..
[16] Lo-Yao Yeh,et al. A secure and efficient batch binding update scheme for route optimization of nested NEtwork MObility (NEMO) in VANETs , 2013, J. Netw. Comput. Appl..
[17] Antonio de la Oliva,et al. Distributed mobility management solutions for next mobile network architectures , 2017, Comput. Networks.
[18] Senthilkumar Mathi,et al. A Secure and Efficient Location Update Scheme for Next Generation Proxy Mobile IP in Distributed Environment , 2015 .
[19] Luca Viganò,et al. Automated Security Protocol Analysis With the AVISPA Tool , 2006, MFPS.
[20] Sebastian Mödersheim,et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.
[21] Jacques Stern,et al. RSA-OAEP Is Secure under the RSA Assumption , 2001, Journal of Cryptology.
[22] Ian F. Akyildiz,et al. A survey of mobility management in next-generation all-IP-based wireless systems , 2004, IEEE Wirel. Commun..
[23] Awadallah M. Ahmed,et al. Enhancement of Seamless mobility in Nested Network Mobility , 2017, 2017 International Conference on Communication, Control, Computing and Electronics Engineering (ICCCCEE).