暂无分享,去创建一个
[1] Ahmed Taha,et al. Formal Verification of IEEE 802.16 Security Sublayer Using Scyther Tool , 2009 .
[2] Ender Yuksel,et al. Analysis of the PKMv2 Protocol in IEEE 802.16e-2005 Using Static Analysis , 2007 .
[3] Nan Li,et al. Research on Diffie-Hellman key exchange protocol , 2010, 2010 2nd International Conference on Computer Engineering and Technology.
[4] Pero Latkoski,et al. IEEE 802.16 Security Issues: A Survey , 2008 .
[5] Wuu Yang,et al. A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity , 2009, 2009 IEEE International Conference on Communications.
[6] Marko Hölbl,et al. An Improved Authentication Protocol Based on One-Way Hash Functions and Diffie-Hellman Key Exchange , 2009, 2009 International Conference on Availability, Reliability and Security.
[7] Lars Michael Kristensen,et al. Coloured Petri Nets and CPN Tools for modelling and validation of concurrent systems , 2007, International Journal on Software Tools for Technology Transfer.
[8] Lei Han,et al. A Threat Analysis of The Extensible Authentication Protocol , 2006 .
[9] Jie Huang,et al. Secure Mutual Authentication Protocols for Mobile Multi-Hop Relay WiMAX Networks against Rogue Base/Relay Stations , 2011, 2011 IEEE International Conference on Communications (ICC).
[10] Liang Jin,et al. The Design of Trusted Access Scheme Based on Identity for WiMAX Network , 2009, 2009 First International Workshop on Education Technology and Computer Science.
[11] Xiaoyao Xie,et al. Verification and research of a Wimax authentication protocol based on SSM , 2010, 2010 2nd International Conference on Education Technology and Computer.
[12] Fang-Yie Leu,et al. Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS , 2011, J. Univers. Comput. Sci..
[13] M.P. Sebastian,et al. A Revised Secure Authentication Protocol for IEEE 802.16 (e) , 2010, 2010 International Conference on Advances in Computer Engineering.