Author:
Li Guangsong,Zeng Yongbin,Guang Hui,Yu Gang
Funder
National Key Research Program of China
Innovative Research Groups of the National Natural Science Foundation of China
National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference29 articles.
1. Mishra, A., Shin, M., & Arbaugh, W. (2003). An empirical analysis of the IEEE 802.11 MAC layer handoff process. ACM.
2. Duan, X., & Wang, X. (2015). Authentication handover and privacy protection in 5G hetnets using software-defined networking. Communications Magazine IEEE, 53(4), 28–35.
3. Fu, A., Zhang, G., Yu, Y., & Zhu, Z. (2014). A privacy preserving vertical handover authentication scheme for WiMAX-WiFi networks. Ksii Transactions on Internet & Information Systems, 8(9), 3250–3265.
4. Kumar, A., & Om, H. (2016). A secure seamless handover authentication technique for wireless LAN. In International conference on information technology, 2016 (pp. 43–47).
5. Wang, W., & Hu, L. (2014). A secure and efficient handover authentication protocol for wireless networks. Sensors, 14(7), 11379–11394.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Elevating Security in Wireless Sensor Networks using ECC and AES Cryptographic Techniques;2023 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES);2023-12-14
2. A novel and lightweight wireless communication scheme for Vehicular Ad hoc Networks;Ad Hoc Networks;2023-04
3. Enhanced and secured random number generation for eUASBP;International Journal of System Assurance Engineering and Management;2021-11-17