Security issues in privacy and key management protocols of IEEE 802.16
暂无分享,去创建一个
[1] William A. Arbaugh,et al. YOUR 802.11 WIRELESS NETWORK HAS NO CLOTHES , 2001 .
[2] Daniel Sweeney,et al. WiMax Operator's Manual: Building 802.16 Wireless Networks, Second Edition , 2005 .
[3] William A. Arbaugh,et al. Your 80211 wireless network has no clothes , 2002, IEEE Wirel. Commun..
[4] S. Wang,et al. IEEE standard 802.16: a technical overview of the WirelessMAN/sup TM/ air interface for broadband wireless access , 2002, IEEE Communications Magazine.
[5] Matthew S. Gast,et al. 802.11 Wireless Networks: The Definitive Guide , 2002 .
[6] Zion Hadad,et al. Handoff Schemes Overview and Guidelines for Handoff Procedures in 802.16 , 2002 .
[7] Wenbo Mao,et al. Modern Cryptography: Theory and Practice , 2003 .
[8] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[9] David Johnston,et al. Overview of IEEE 802.16 security , 2004, IEEE Security & Privacy Magazine.
[10] Ron Olexa,et al. Implementing 802.11, 802.16, and 802.20 Wireless Networks: Planning, Troubleshooting, and Operations , 2004 .
[11] Chong-kwon Kim,et al. A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access , 2005, International Conference on Computational Science.