1 |
B. Ludovic, C. Claude, M. Karim, S. Hesham, Hierarchical Mobile IPv6(HMIPv6), RFC 4140, 2005
|
2 |
K. Rajeev, Fast Handovers for Mobile IPv6, RFC 4068, 2005
|
3 |
C. Claude, M. Gabriel, Statistically Unique and Cryptographically Verifiable Identifiers and Addresses, In Proc, ISOC Symposium on Network and Distributed System Security (NDSS 2002), San Diego, Feb. 2002
|
4 |
B. Feng, D. Robert H., Z. Jianying, Defending against Redirect Attacks in Mobile IP, IN Proc. The 9th ACM conference on Computer and Communications security, Washington D.C., Nov. 18-22, 2002
|
5 |
C. Jaejuck, J. Souhwan, Access Authentication Protocol in FMIPv6, Internet Draft, draft-jung-mipshop-access-auth-00.txt,. 2006
|
6 |
N. Vidya, T. Hannes, V. Narayanan, Establishing Handover Keys using Shared Keys, Internet Draft, draft-vidya-mipshophandover-keys-aaa-04.txt, Mar. 2007
|
7 |
J. HeeYoung, K. SeokJoo, L. JaeYong, S. Hesham, Fast Handover for Hierarchical MIPv6(F-HMIPv6), Internet Draft, draft-jungmobopts-fhmipv6-00.txt, April 2005
|
8 |
A. Jari, J. David B., P. Charles E., Mobility Support in IPv6, RFC 3775, 2004
|
9 |
K. James, K. Rajeev, Bootstrapping a Symmetric IPv6 Handover Key from SEND, Internet Draft, draft-kempf-mobopts-handover-key-01.txt. 2005
|
10 |
O. Greg, R. Michael, Child-proof Authentication for MIPv6(CAM), ACM Computer Communications Review, 31(2), July 2001
|
11 |
K. HyunSun., P. ChangSeop, MIPv6 Binding Update Protocol Secure Against Both Redirect and DoS Attacks. CISC, Lecture Notes in Computer Science, Vol.3822 of LNCS, Springer-Verlag, pp. 407-418, 2005
|
12 |
A. Tuomas, Cryptographically Generated Addresses, RFC 3972, 2005
|
13 |
C. Kuntal, Y. Alper, MIP6-bootstrapping via DHCPv6 for the Integrated Scenario, Internet Draft, draft-ietf-mip6-bootstrapping-integrateddhc-00.txt, 2005
|
14 |
J. HeeYoung, K. EunAh, L. HyeongHo, Y. JongWha, A Scheme for Supporting Fast Handover in Hierarchical Mobile IPv6 Networks, ETRI Journal, vol.27, No.6, pp.798-801, Dec. 2005
DOI
ScienceOn
|
15 |
C. Claude, M. Gabriel, Crypto-Based Identifiers(CBID), Concepts and Applications, ACM, Transaction on Information and System Security, Vol.7, No.1, pp. 97-127, 2004
DOI
|
16 |
H. Wassim, K. Suresh, Combining Cryptographically Generated Address and Crypto- Based Identifiers to Secure HMIPv6, Internet Draft, draft-haddad-mipshop- hmipv6-security-06, 2006
|