A modified PKM environment for the security enhancement of IEEE 802.16 e
PK Panda, S Chattopadhyay - Computer Standards & Interfaces, 2019 - Elsevier
IEEE 802.16 standard developed Privacy Key Management (PKM) security protocol for
WiMAX. However, it still suffers from various attacks such as forgery attack, replay attack …
WiMAX. However, it still suffers from various attacks such as forgery attack, replay attack …
Dynamic key encryption using the embedded three pass protocol for securing TCP Streams in WiMAX link
Suherman, M Al-Akaidi - American University in the Emirates International …, 2020 - Springer
This paper proposes embedded three pass protocol (TPP) for securing TCP streams through
the worldwide interoperability microwave access (WiMAX) link. TPP messages are …
the worldwide interoperability microwave access (WiMAX) link. TPP messages are …
Computationally Efficient WiMax with Handover Scheme using Elliptic Curve Diffie Hellman (ECDH) Key Agreement Protocol
K Yadav, L Ratusaria, D Swaroop… - … on Computing, Power …, 2018 - ieeexplore.ieee.org
WiMax is a leading wireless broadband technology, supports fixed (IEEE802. 16d) and
mobile (IEEE802. 16e) connectivity. WiMax Technology covers a large area, along with …
mobile (IEEE802. 16e) connectivity. WiMax Technology covers a large area, along with …
[图书][B] Importance of Timely and Efficient Data Collection Process in Security Risk Management
MT Ismail - 2021 - search.proquest.com
An organization's security posture is directly affected due to inefficient data collection
practices during the implementation of security frameworks leading to significant cyber …
practices during the implementation of security frameworks leading to significant cyber …