Attacks and countermeasures on 802.16: Analysis and assessment
C Kolias, G Kambourakis… - … Surveys & Tutorials, 2012 - ieeexplore.ieee.org
The IEEE 802.16 technology, commonly referred to as WiMAX, gains momentum as an
option for broadband wireless communication access. So far, several research works focus …
option for broadband wireless communication access. So far, several research works focus …
Fast and secure multihop broadcast solutions for intervehicular communication
Intervehicular communication (IVC) is an important emerging research area that is expected
to considerably contribute to traffic safety and efficiency. In this context, many possible IVC …
to considerably contribute to traffic safety and efficiency. In this context, many possible IVC …
QoS-aware distributed security architecture for 4G multihop wireless networks
P Rengaraju, CH Lung… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
Vehicular communications have received a great deal of attention in recent years due to the
demand for multimedia applications during travel and for improvements in safety. Safety …
demand for multimedia applications during travel and for improvements in safety. Safety …
A reliable group key management scheme for broadcast encryption
A major challenge achieving scalable access control for a large number of subscribers in a
public broadcast is to distribute key update messages reliably to all stateless receivers …
public broadcast is to distribute key update messages reliably to all stateless receivers …
[图书][B] Encyclopedia of Information Systems and Technology-Two Volume Set
PA Laplante - 2015 - books.google.com
Spanning the multi-disciplinary scope of information technology, the Encyclopedia of
Information Systems and Technology draws together comprehensive coverage of the inter …
Information Systems and Technology draws together comprehensive coverage of the inter …
Design of distributed security architecture for multihop WiMAX networks
P Rengaraju, CH Lung… - 2010 Eighth International …, 2010 - ieeexplore.ieee.org
In this paper, we study the current security standards in multihop WiMAX networks and their
security issues. For secured communications, hop-by-hop authentication is necessary for …
security issues. For secured communications, hop-by-hop authentication is necessary for …
Securing recommendations in grouped P2P e-commerce trust model
In dynamic peer to peer (P2P) e-commerce, it is an important and difficult problem to
promote online businesses without sacrificing the desired trust to secure transactions. In this …
promote online businesses without sacrificing the desired trust to secure transactions. In this …
Survey of Mobile WiMAX and its threats
G Narang, BV Lonavala, R Dadhich… - … Conference on ICT in …, 2016 - ieeexplore.ieee.org
4G is based on two core technologies LTE (Long-Term Evaluation) and Mobile WiMAX
(Worldwide Interoperability for Microwave Access). LTE and WiMAX system architectures …
(Worldwide Interoperability for Microwave Access). LTE and WiMAX system architectures …
5G broadcast/multicast security key refresh
SB Lee, M Griot, GB Horn - US Patent 11,671,824, 2023 - Google Patents
Typical wireless communication systems may employ multiple-access technologies capable
of supporting communication with multiple users by sharing available system resources …
of supporting communication with multiple users by sharing available system resources …
An intrusion detection system based on WiMAX
B Zhou - Proceedings of 2011 International Conference on …, 2011 - ieeexplore.ieee.org
Through the analysis of some security vulnerabilities of WiMAX network and according to the
characteristics of the WiMAX network and the research status of intrusion detection, this …
characteristics of the WiMAX network and the research status of intrusion detection, this …