Towards secure wirelessMAN: Revisiting and evaluating authentication in WiMAX
暂无分享,去创建一个
Raheel M. Hashmi | Arooj M. Siddiqui | M. Jabeen | K. S. Alimgeer | K. Alimgeer | R. Hashmi | A. Siddiqui | M. Jabeen
[1] Chin-Tser Huang,et al. Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions , 2006, 2006 3rd International Symposium on Wireless Communication Systems.
[2] Nelson Luis Saldanha da Fonseca,et al. WiMAX Module for the ns-2 Simulator , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.
[3] Sheldon M. Ross,et al. Introduction to Probability and Statistics for Engineers and Scientists , 1987 .
[4] Gavin Lowe. A Family of Attacks upon Authentication Protocols , 1997 .
[5] Chin-Tser Huang,et al. Security issues in privacy and key management protocols of IEEE 802.16 , 2006, ACM-SE 44.
[6] Bjarne E. Helvik,et al. A module-based wireless node for NS-2 , 2006 .
[7] Jenhui Chen,et al. The design and implementation of WiMAX module for ns-2 simulator , 2006 .
[8] Michel Barbeau. WiMax/802.16 threat analysis , 2005, Q2SWinet '05.
[9] Heba Kamal Aslan,et al. WiMax Security , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).
[10] Hao Zhou,et al. Synchronization Issues in OFDM Systems , 2006, APCCAS 2006 - 2006 IEEE Asia Pacific Conference on Circuits and Systems.
[11] M. Younus Javed,et al. Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005 , 2008, 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing.
[12] Khurram Saleem Alimgeer,et al. Computational Complexities and Breaches in Authentication Frameworks of Broadband Wireless Access , 2009, ArXiv.
[13] Arooj M. Siddiqui,et al. Improved Secure Network Authentication Protocol (ISNAP) for IEEE 802.16 , 2009, 2009 International Conference on Information and Communication Technologies.
[14] Michel Barbeau,et al. Rogue-base station detection in WiMax/802.16 wireless access networks , 2006, Ann. des Télécommunications.
[15] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[16] M. Younus Javed,et al. Performance Analysis of Secured Privacy and Key Management Protocol in IEEE 802-16e-2005 , 2009, J. Digit. Content Technol. its Appl..
[17] Srilekha Mudumbai,et al. Certificate-based authorization policy in a PKI environment , 2003, TSEC.
[18] Li Gong,et al. A security risk of depending on synchronized clocks , 1992, OPSR.