1 |
WiMAX Forum NWG, 'Stage-3: Detailed Protocol and Procedures', 2007
|
2 |
IEEE 802.16e-2005, 'Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems', 2006
|
3 |
S. Xu, M. M. Matthews, and C.-T. Huang, 'Security issues in privacy and key management protocols of IEEE 802.16,' in ACM Southeast Regional Conference, R. Menezes, Ed. ACM, pp. 113-118, 2006
|
4 |
M. Barbeau, 'Wimax/802.16 threat analysis,' in Q2SWinet '05: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks. New York, NY, USA: ACM Press, pp. 8-15, 2005
|
5 |
A. Ghosh, D. R. J. Wolter, G. Andrews, and R. Chen, 'Broadband Wireless Access with WiMax/802.16: Current Performance Benchmarks and Future Potential', IEEE Communications Magazines, vol. 43, issue 2, pp. 129∼136. Feb. 2005
|
6 |
S. Xu and C.-T. Huang, "Attacks on PKM protocols of IEEE 802.16 and its later versions", Proceedings of the 3rd International Symposium on Wirelesss Comunication Systems (ISWCS 2006), Sep. 2006
|
7 |
S. Xu, M. Mattews and C.-T. Huang, 'Security issues in privacy and key management protocols of IEEE 802.16', Proceedings of the 44th ACM Southeast Conference(ACMSE 2006), Mar. 2006
|
8 |
IETF RFC 4285, 'Authentication Protocol for Mobile IPv6', 2006
|
9 |
D. Johnston and J. Walker, 'Overview of IEEE 802.16 Security', IEEE Security & Privacy, 2004
|
10 |
D. Sweeney, 'WiMax Operator Manual: building 802.16 Wireless Networks', Apress, 2005
|
11 |
IEEE 802.16e-2005, 'Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems', 2006
|
12 |
WiMAX Forum NWG, 'Stage-3: Detailed Protocol and Procedures' 2007
|
13 |
D. Johnston and J. Walker, 'Overview of IEEE 802.16 security,' IEEE Security & Privacy, vol. 2, no. 3, pp. 40-88, May/June 2004
DOI
ScienceOn
|