Ramezani, 2016 - Google Patents
Coordinated Robust Authentication In Wireless NetworksRamezani, 2016
View PDF- Document ID
- 3963656741275386620
- Author
- Ramezani K
- Publication year
External Links
Snippet
Rapid convergence of heterogeneous wireless communication technologies such as Wireless Local Area Networks (WLAN), 4G: LTE/LTE-Advanced Mobile Broadband, 5G and Worldwide Interoperability for Microwave Access (WiMAX), attract new opportunities for …
- 230000007246 mechanism 0 abstract description 107
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Aboba et al. | Extensible authentication protocol (EAP) key management framework | |
Arbaugh et al. | Your 80211 wireless network has no clothes | |
Salgarelli et al. | Efficient authentication and key distribution in wireless IP networks | |
EP2127315B1 (en) | Bootstrapping kerberos from eap (bke) | |
US20230014894A1 (en) | Quantum resistant secure key distribution in various protocols and technologies | |
US8667151B2 (en) | Bootstrapping method for setting up a security association | |
JP5771603B2 (en) | Media independent handover protocol security | |
CN101594616B (en) | Authentication method, server, user equipment and communication system | |
US20090063851A1 (en) | Establishing communications | |
US20040236939A1 (en) | Wireless network handoff key | |
Dantu et al. | EAP methods for wireless networks | |
Yang et al. | 3G and WLAN interworking security: Current status and key issues | |
Sithirasenan et al. | An EAP framework for unified authentication in wireless networks | |
Sithirasenan et al. | EAP-CRA for WiMAX, WLAN and 4G LTE Interoperability | |
Prasad et al. | A secure certificate based authentication to reduce overhead for heterogeneous wireless network | |
Ramezani | Coordinated Robust Authentication In Wireless Networks | |
Srinivasan et al. | VOUCH-AP: privacy preserving open-access 802.11 public hotspot AP authentication mechanism with co-located evil-twins | |
Sithirasenan et al. | Enhanced CRA protocol for seamless connectivity in wireless networks | |
Ntantogian et al. | Reducing authentication traffic in 3G-WLAN integrated networks | |
Iyer et al. | Public WLAN Hotspot Deployment and Interworking. | |
Ntantogian et al. | A security protocol for mutual authentication and mobile VPN deployment in B3G networks | |
Xenakis et al. | Alternative Schemes for Dynamic Secure VPN Deployment in UMTS | |
Park et al. | A new user authentication protocol for mobile terminals in wireless network | |
Egners et al. | Multi-operator wireless mesh networks secured by an all-encompassing security architecture | |
Santos | Secure Wifi Portals in WIFI4EU Environment |