Wimax standards and Security The Wimax



Download 2,02 Mb.
bet149/186
Sana29.05.2022
Hajmi2,02 Mb.
#619147
1   ...   145   146   147   148   149   150   151   152   ...   186
Bog'liq
CRC - WiMAX.Standards.and.Security

References

  1. M. Barbeau, WiMAX/802.16 threat analysis, in Proceedings of ACM Q2SWinet’05, Montreal, Quebec, Canada, October 13, 2005.

  2. J.L. Burbank and W.T. Kasch, IEEE 802.16 broadband wireless technology and its application to the military problem space, in Proceedings of the 2005 IEEE Military Communications Conference (MILCOM 2005), Vol. 3, pp. 1905–1911, October 2005.


  3. +
    Data-Over-Cable Service Interface Specifications: Baseline Privacy Plus Inter- face Specification SP-BPI -I05-000714, DOCSIS, http://www.cablemodem. com/, July 2000.

  4. C. Ecklund, R.B. Marks, K.L. Stanwood, and S. Wang, IEEE Standard 802.16: A technical overview of the wirelessMAN air interface for broadband wireless access, IEEE Communications Magazine, Vol. 40, No. 6, pp. 98–107, June 2002.

  5. E.B. Fernandez, S. Rajput, M. VanHilst, and M.M. Larrondo-Petrie, Some security issues of wireless systems, in Proceedings of IEEE Fifth International Symposium and School on Advanced Distributed Systems (ISSADS 2005), Guadala- jara, Mexico, January 24–28, 2005, and in F.F. Ramos et al. (eds.) Lecture Notes in Computer Science, LNCS Vol. 3563, Springer-Verlag, Berlin, Heidelberg, pp. 388–396, 2005.

  6. E.B. Fernandez, I. Jawhar, M.M. Larrondo-Petrie, and M. VanHilst, An overview of the security of wireless networks, Chapter 3 in the Handbook of Wireless LANs,

M. Ilyas and S. Ahson (eds.), CRC Press, Boca Raton, FL, pp. 51–68, 2005.

  1. D. Gollmann, Computer Security (2nd ed.), West Sussex, Wiley, 2006.

  2. D. Johnston and J. Walker, Overview of IEEE 802.16 security, IEEE Security and Privacy, pp. 40–48, May/June 2004.

  3. C. Larman, Applying UML and Patterns: An Introduction to Object-Oriented Analy- sis and Design and Iterative Development, 3rd edition, Prentice-Hall, Upper Saddle River, NJ, 2005.

  4. M. Schumacher, E.B. Fernandez, D. Hybertson, F. Buschmann, and

P. Sommerlad, Security Patterns: Integrating Security and Systems Engineering,
Wiley, Chichester, W. Sussex, England, 2006.

  1. S. Xu, M. Mathews, and C.T. Huang, Security issues in privacy and key man- agement protocols of IEEE 802.16, in Proceedings of ACM SE’06, Melbourne, FL, March 2006.

  2. F. Yang, H. Zhou, L. Zhang, and J. Feng, An improved security scheme in WMAN based on IEEE Standard 802.16, Wireless Communication, Networking and Mobile Computing, Vol. 2, pp. 1191–1194, September 2005.

11
Privacy and Security in WiMAX Networks

Download 2,02 Mb.

Do'stlaringiz bilan baham:
1   ...   145   146   147   148   149   150   151   152   ...   186




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish