1 |
C.Perkins, D.Johnson, and J.Arkko, "Mobility support in IPv6," RFC 6275, July 2011.
|
2 |
S.Gundavelli et al., "Proxy mobile IPv6," RFC 5213, Aug 2008.
|
3 |
D.Liu and et al., "Distributed mobility management: current practices and gap analysis," RFC 7429, Jan 2015.
|
4 |
D.Dummit, E.Dummit, and H. Kisilevsky, "Characterizations of quadratic, cubic, and quartic residue matrices," Journal of Number Theory, Vol. 168, pp. 167-179, Nov. 2016.
DOI
|
5 |
M.Elia, M.Piva, and D.Schipani, "The Rabin cryptosystem revisited," Applicable Algebra in Engineering, Communication and Computing, Vol. 26, No. 3, pp. 251-275, Jun. 2015.
DOI
|
6 |
J.Lee, J.Bonnin, I.You and T. Chung, "Comparative handover performance analysis of IPv6 mobility management protocols," IEEE Transactions on Industrial Electronics, vol. 60, no. 3, pp. 1077-1088, March. 2013.
DOI
|
7 |
Crypto++ Library 5.6.3, available at http://www.cryptopp.com/.
|
8 |
M. Chuang, J. Lee, and M. Chen, "SPAM: A secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks," IEEE Systems Journal, Vol. 7, No. 1, pp. 102-113, March. 2013.
DOI
|
9 |
J. Lee, "Secure authentication with dynamic tunneling in distributed IP mobility management," IEEE Wireless Communications, Vol. 23, No. 5, pp 38-43, Oct. 2016.
DOI
|