1 |
Barceló, F., Paradells, J., Setaki, F., and Gibeaux, M., "Design and Modeling of Internode: A Mobile Provider Provisioned VPN," Mobile Networks and Applications, Vol. 8, No. 1, pp. 51-60, 2003.
DOI
|
2 |
Beauchamps, M., Hoitjink, M., and Leese, M., "Introduction: Security/Mobility and the Politics of Movement," Manchester University Press, pp. 1-13, 2017.
|
3 |
Choi, W. G. and Lee, Y. J., "Factors Influencing the Introduction of Mobile Security Technology," The Journal of Society for e-Business Studies, Vol. 18, No. 4, pp. 215-240, 2013.
DOI
|
4 |
Croitoru, A., Niculescu, D., and Raiciu, C., "Towards WiFi Mobility without Fast Handover," Proceedings of the 12th USENIX Conference on Networked Systems Design and Implementation, pp. 219-234, 2015.
|
5 |
Dutta, A. and Shulzrinne, H., "Mobility Protocols and Handover Optimization," John Wiley & Sons, Ltd-IEEE Press, 2014.
|
6 |
Gu, R., Zhang, X., Yu, L., and Zhang, J., "Enhancing Security and Scalability in Software Defined LTE Core Networks," 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering(TrustCom/BigDataSE), IEEE, 2018.
|
7 |
IEEE Std. 802.1AE, "Media Access Control (MAC) Security," 2006.
|
8 |
Altunbasak, H., Krasser, S., Owen, H. L., Grimminger, J., Huth, H. P., and Sokol, J., "Securing Layer 2 in Local Area Networks," Networking-ICN, pp. 699-706, 2005.
|
9 |
Jaggi, C., "Ethernet Encryptors for Metro and Carrier Ethernet," http://www.uebermeister.com/publications.html, 2017.
|
10 |
John, W., Pentikousis, K., Agapiou, G., Jacob, E., Kind, M., Manzalini, A., Risso, F., Staessens, D., Steinert, R., and Meirosu, C., "Research Directions in Network Service Chaining," SDN4FNS 2013 Workshop on Software Defined Networks for Future Networks and Services, IEEE SDN, pp. 1-7, 2013.
|
11 |
Shin, H., Song, Y. U., Sung, N. H., "The Impact of Perception on the Difference Between Mobile and Stationary Internet Toward the Intention to Use Mobile Internet," The Journal of Society for e-Business Studies, Vol. 15, No. 3, pp. 99-129, 2010.
|
12 |
Lee, S. and Jahng, J., "The Diffusion of Internet of Things: Forecasting Technologies and Company Strategies using Qualitative and Quantitative Approach," The Journal of Society for e-Business Studies, Vol. 20, No. 4, pp. 19-39, 2015.
DOI
|
13 |
McCann, P., "Mobile IPv6 Fast Handovers for 802.11 Networks," IETF RFC 4260, November 2005.
|
14 |
Quinn, P. and Nadeau, T., "Problem Statement for Service Function Chaining," IETF RFC 7498, April 2015.
|