NUK - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

2 3 4 5
zadetkov: 48
31.
  • Secure Re-authentication Sc... Secure Re-authentication Scheme for 3G-WLAN Integrating Network Based on Protocol Composition Logic
    Tao Feng; Hui Chen; Jian-feng Ma 2012 International Conference on Computer Science and Service System, 2012-Aug.
    Conference Proceeding

    The new re-authentication protocol named SFR is proposed to make up for lack of authentication to access network in existing re-authentication protocol. One kind of key is generated using SKEY ...
Celotno besedilo
32.
  • Enhanced fast iterative localized re-authentication protocol for UMTS-WLAN interworking
    Anantha Narayanan, V.; Suresh Kumar, V.; Rajeswari, A. 2014 International Conference on Electronics and Communication Systems (ICECS), 2014-Feb.
    Conference Proceeding

    The next generation wireless access networks (NGWN) should be capable of interoperable with other communication technologies and should coordinate with them to offer best connectivity to the users. ...
Celotno besedilo
33.
  • A new fast re-authentication method for the 3G-WLAN interworking based on EAP-AKA
    El Hajjaji El Idrissi, Younes; Zahid, Noureddine; Jedra, Mohamed ICT 2013, 05/2013
    Conference Proceeding

    The 3G network technology provides a completed connectivity solution with low data rates. While wireless network offers a high data rate in a small geographic area, interworking the 3G and WLAN can ...
Celotno besedilo
34.
  • Seamless authentication and... Seamless authentication and mobility across heterogeneous networks using federated identity systems
    Targali, Yousif; Choyi, Vinod; Shah, Yogendra 2013 IEEE International Conference on Communications Workshops (ICC), 2013-June
    Conference Proceeding

    With the increasing demand for mobile data services and increased availability of multimode devices with multiple wireless interfaces, seamless mobility and service continuity across heterogeneous ...
Celotno besedilo
35.
  • The Iterative Distributed R... The Iterative Distributed Re-authentication Scheme Based on EAP-AKA in 3G/UMTS-WLAN Heterogeneous Mobile Networks
    Shen-Ho Lin; Jung-Hui Chiu; Sung-Shiou Shen 2010 International Conference on Broadband, Wireless Computing, Communication and Applications, 2010-Nov.
    Conference Proceeding

    3G/UMTS-WLAN heterogeneous mobile network is a complementary platform for the trend of Beyond-3G (B3G) wireless data communications. However, the design of a securing authentication protocol in ...
Celotno besedilo
36.
  • Efficient authentication for users autonomy in Next Generation All-IP networks
    Ntantogian, C.; Xenakis, C.; Stavrakakis, I. 2007 2nd Bio-Inspired Models of Network, Information and Computing Systems, 2007-Dec.
    Conference Proceeding

    Next generation networks (NGNs) provide multimedia services to mobile users through different access networks that facilitate users autonomy. The security architecture of NGNs specifies that a WLAN ...
Celotno besedilo
37.
  • Seamless authentication acr... Seamless authentication across heterogeneous networks using Generic Bootstrapping systems
    Targali, Yousif; Choyi, Vinod; Shah, Yogendra 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC), 2013-July
    Conference Proceeding

    With the increasing demand for mobile data services and increased availability of multimode devices with multiple wireless interfaces, seamless mobility and service continuity across heterogeneous ...
Celotno besedilo
38.
  • Hybrid next generation mobi... Hybrid next generation mobile system analysis based on Internet applications
    Chowdhury, A S; Gregory, M 2010 Australasian Telecommunication Networks and Applications Conference, 2010-Oct.
    Conference Proceeding

    To address future demand for improved services the next generation mobile systems will be compatible and interoperable with IPv6 and with various access technologies such as 802. llx. Discussion in ...
Celotno besedilo
39.
  • Security enhancement with o... Security enhancement with optimal QoS using ECDH for converged 3G-WLAN system
    Shankar, R; Rajkumar, K T; Dananjayan, P 2010 11th International Conference on Control Automation Robotics & Vision, 2010-Dec.
    Conference Proceeding

    The convergence of third generation (3G) wide area wireless network and wireless local area network (WLAN) offers characteristics that complement each other perfectly. To provide secure 3G-WLAN ...
Celotno besedilo
40.
  • Formal analysis of improved... Formal analysis of improved EAP-AKA based on Protocol Composition Logic
    Peng Liu; Peng Zhou 2010 2nd International Conference on Future Computer and Communication 3
    Conference Proceeding

    A formal analysis based on PCL (Protocol Composition Logic) points out the vulnerability during the composition of EAP-AKA, and proposes an improved protocol EAP-AKA'. Based on DH protocol, the new ...
Celotno besedilo
2 3 4 5
zadetkov: 48

Nalaganje filtrov