Introducing identity management in WiMAX to enable secure and personalized services
暂无分享,去创建一个
Andrés Marín López | Florina Almenárez | Daniel Díaz Sánchez | Patricia Arias Cabarcos | Davide Proserpio | Rosa Sánchez-Guerrero
[1] Yi Qu,et al. Analysis on mobile WiMAX security , 2009, 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH).
[2] Taejoon Park,et al. A Survey of Security Threats on 4G Networks , 2007, 2007 IEEE Globecom Workshops.
[3] Celeste Campo,et al. PTM: A Pervasive Trust Management Model for Dynamic Open Environments ⁄ , 2003 .
[4] Ranga Reddy,et al. Distributed Trust Relationship and Polynomial Key Generation for IEEE 802.16m Networks , 2009, 2009 IEEE Mobile WiMAX Symposium.
[5] Chin-Tser Huang,et al. Responding to Security Issues in WiMAX Networks , 2008, IT Professional.
[6] David Johnston,et al. Overview of IEEE 802.16 security , 2004, IEEE Security & Privacy Magazine.
[7] Michel Barbeau. WiMax/802.16 threat analysis , 2005, Q2SWinet '05.
[8] Larry J. Blunk,et al. PPP Extensible Authentication Protocol (EAP) , 1998, RFC.
[9] WalkerJesse,et al. Overview of IEEE 802.16 Security , 2004, S&P 2004.