Securing NEMO Using a Bilinear Pairing-Based 3-Party Key Exchange (3PKE-NEMO) in Heterogeneous Networks
暂无分享,去创建一个
[1] James Harris. Defending the network several times over , 2011, Netw. Secur..
[2] Yanghee Choi,et al. Authentication, Authorization, and Accounting (AAA) Framework in Network Mobility (NEMO) Environments , 2008 .
[3] Shadi Aljawarneh,et al. Cloud security engineering: Early stages of SDLC , 2017, Future Gener. Comput. Syst..
[4] Asif Imran,et al. Web Data Amalgamation for Security Engineering: Digital Forensic Investigation of Open Source Cloud , 2016, J. Univers. Comput. Sci..
[5] Kuinam J. Kim,et al. Secure Route Optimization Scheme for Network Mobility Support in Heterogeneous Mobile Networks , 2017, Wirel. Pers. Commun..
[6] B. R. Chandavarkar,et al. Survey Paper: Mobility Management in Heterogeneous Wireless Networks , 2012 .
[7] Keecheon Kim,et al. An enhanced mechanism with cryptographic computation cost reduction in AAA-mobile IP architecture , 2013, ICUIMC '13.
[8] Man Young Rhee. Network Layer Security , 2013 .
[9] Shadi Aljawarneh,et al. A web engineering security methodology for e-learning systems , 2011, Netw. Secur..
[10] Sumita Mishra,et al. A survey of identity and handoff management approaches for the future Internet , 2012, Comput. Commun..
[11] Shadi Aljawarneh,et al. A Conceptual Security Framework for Cloud Computing Issues , 2016, Int. J. Intell. Inf. Technol..
[12] Shadi Aljawarneh,et al. A resource-efficient encryption algorithm for multimedia big data , 2017, Multimedia Tools and Applications.
[13] Mohammed Atiquzzaman,et al. Route optimization in network mobility: Solutions, classification, comparison, and future research directions , 2010, IEEE Communications Surveys & Tutorials.
[14] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[15] Shadi Aljawarneh,et al. A multithreaded programming approach for multimedia big data: encryption system , 2017, Multimedia Tools and Applications.
[16] Shadi R. Masadeh,et al. A Secure Data Transmission Mechanism for Cloud Outsourced Data , 2013, Int. J. Cloud Appl. Comput..
[17] Marcelo Bagnulo,et al. Securing route optimisation in NEMO , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).
[18] Ashraf Odeh,et al. Secure Communication: A Proposed Public Key Watermark System , 2013, Int. J. Inf. Secur. Priv..
[19] Bo Hu,et al. Mobility Management at Network Layer , 2016 .
[20] Victor Fajardo,et al. IEEE 802.21: Media independent handover: Features, applicability, and realization , 2009, IEEE Communications Magazine.
[21] Lo-Yao Yeh,et al. A secure and efficient batch binding update scheme for route optimization of nested NEtwork MObility (NEMO) in VANETs , 2013, J. Netw. Comput. Appl..
[22] Christopher Edwards,et al. A Collaborative AAA Architecture to Enable Secure Real-World Network Mobility , 2011, Networking.
[23] Yuan'an Liu,et al. A local secure handover authentication scheme based on AAA for NEMO in aeronautical passanger communication environment , 2015, 2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC).
[24] Jung-Doo Koo,et al. Authenticated route optimization scheme for network mobility (NEMO) support in heterogeneous networks , 2010 .
[25] Shadi Aljawarneh,et al. Investigations of automatic methods for detecting the polymorphic worms signatures , 2016, Future Gener. Comput. Syst..
[26] Burkhard Stiller,et al. AAA: a survey and a policy-based architecture and framework , 2002 .
[27] C. E. Perkins. Mobile IP , 1997 .
[28] Christian Huitema,et al. End-system-based mobility support in IPv6 , 2005, IEEE Journal on Selected Areas in Communications.
[29] Jeng-Farn Lee,et al. A lightweight mutual authentication mechanism for network mobility in IEEE 802.16e wireless networks , 2011, Comput. Networks.
[30] Marcelo Bagnulo,et al. CRYPTRON: CRYptographic Prefixes for Route Optimization in NEMO , 2010, 2010 IEEE International Conference on Communications.
[31] Mihui Kim,et al. A Scalable Mutual Authentication and Key Distribution Mechanism in a NEMO Environment , 2005, ICCSA.
[32] Kumkum Garg,et al. A review on host vs. Network Mobility (NEMO) handoff techniques in heterogeneous network , 2014, Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization.
[33] Debashis De,et al. Location management in mobile network: A survey , 2016, Comput. Sci. Rev..
[34] Ruoshan Kong. The Simulation for Network Mobility Based on NS2 , 2008, 2008 International Conference on Computer Science and Software Engineering.
[35] Wonjun Lee,et al. Optimal Binding-Management-Key Refresh Interval in Mobile IPv6 Networks , 2009, IEEE Transactions on Vehicular Technology.
[36] Christian Bauer. A Secure Correspondent Router Protocol for NEMO Route Optimization , 2013, Comput. Networks.
[37] Eranga Perera,et al. Survey on network mobility support , 2004, MOCO.
[38] DeDebashis,et al. Location management in mobile network , 2016 .
[39] Chin-Ling Chen,et al. A Bilinear Pairing-Based Dynamic Key Management and Authentication for Wireless Sensor Networks , 2015, J. Sensors.
[40] Tatsuaki Okamoto,et al. Cryptography Based on Bilinear Maps , 2006, AAECC.
[41] SeongHan Shin,et al. LR-AKE-Based AAA for Network Mobility (NEMO) Over Wireless Links , 2006, IEEE Journal on Selected Areas in Communications.
[42] Tai-Myung Chung,et al. Reducing Communication Overhead for Nested NEMO Networks: Roaming Authentication and Access Control Structure , 2011, IEEE Transactions on Vehicular Technology.
[43] Sungchang Lee,et al. Route Optimization with AAA in Network Mobility , 2006, ICCSA.
[44] Pierre Reinbold,et al. IP micro-mobility protocols , 2003, IEEE Communications Surveys & Tutorials.
[45] Xuemin Shen,et al. Multiple Key Sharing and Distribution Scheme With$(n,t)$Threshold for NEMO Group Communications , 2006, IEEE Journal on Selected Areas in Communications.