Key Management Protocol in WIMAX Revisited
暂无分享,去创建一个
[1] Wang Jian-qiu,et al. A Simple Key Management Scheme Based on WiMAX , 2008 .
[2] Cjf Cas Cremers. Scyther : semantics and verification of security protocols , 2006 .
[3] Chin-Tser Huang,et al. Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions , 2006, 2006 3rd International Symposium on Wireless Communication Systems.
[4] M. Younus Javed,et al. Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005 , 2008, 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing.
[5] Cas J. F. Cremers,et al. The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols , 2008, CAV.
[6] Wei-min Lang,et al. A Simple Key Management Scheme Based on WiMAX , 2008, 2008 International Symposium on Computer Science and Computational Technology.
[7] David Johnston,et al. Overview of IEEE 802.16 security , 2004, IEEE Security & Privacy Magazine.