Secure data transmission with cloud computing in heterogeneous wireless networks
暂无分享,去创建一个
[1] Muhammad Jaseemuddin. An architecture for integrating UMTS and 802.11 WLAN networks , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.
[2] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[3] Allan C. Rubens,et al. Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.
[4] Larry J. Blunk,et al. PPP Extensible Authentication Protocol (EAP) , 1998, RFC.
[5] Jari Arkko,et al. Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA') , 2009, RFC.
[6] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[7] Wen-Shenq Juang,et al. Efficient 3GPP Authentication and Key Agreement with Robust User Privacy Protection , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[8] Colin Boyd,et al. Key Establishment Protocols for Secure Mobile Communications: A Selective Survey , 1998, ACISP.
[9] Yuguang Fang,et al. Security analysis and enhancements of 3GPP authentication and key agreement protocol , 2005, IEEE Trans. Wirel. Commun..
[10] Chunming Liu,et al. An improved interworking architecture for UMTS-WLAN tight coupling , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[11] Rajeev Koodli,et al. Fast Handovers for Mobile IPv6 , 2001, RFC.
[12] Chunming Liu,et al. HCRAS: A novel hybrid internetworking architecture between WLAN and UMTS cellular networks , 2005, Second IEEE Consumer Communications and Networking Conference, 2005. CCNC. 2005.
[13] Yen-Chieh Ouyang,et al. A new security key exchange channel for 802.11 WLANs , 2003, IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings..
[14] William A. Arbaugh,et al. An Initial Security Analysis of the IEEE 802.1X Standard , 2002 .
[15] Henry Haverinen,et al. Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM) , 2006, RFC.
[16] Melbourne Barton,et al. Mobility management in integrated UMTS/WLAN networks , 2003, IEEE International Conference on Communications, 2003. ICC '03..
[17] Yan Zhang,et al. Security Management in the Next Generation Wireless Networks , 2006, Int. J. Netw. Secur..
[18] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[19] Georgios Kambourakis,et al. Advanced SSL/TLS-based authentication for secure WLAN-3G interworking , 2004 .
[20] Hyun-Ho Choi,et al. A seamless handoff scheme for UMTS-WLAN interworking , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[21] Seung-Jae Han,et al. Integration of 802.11 and third-generation wireless data networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[22] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.