[1]
A. M. Fu, Y. Q. Zhang, Z. C. Zhu, Q. Jing, J. Y. Feng, An efficient handover authentication scheme with privacy preservation for IEEE 802. 16m network, Computers & Security. 31(2012) 741-749.
DOI: 10.1016/j.cose.2012.06.008
Google Scholar
[2]
Y. Heung Youl, Extensible authentication protocol overview and its applications, IEICE Transactions on Information and Systems. E92-D(2009)766-776.
DOI: 10.1587/transinf.e92.d.766
Google Scholar
[3]
T. N. Nguyen, M. D. Ma, An Pre-authentication Protocol with Symmetric Keys for Secure Handover in Mobile WiMAX Networks, 2012 IEEE International Conference on Communications. (2012).
DOI: 10.1109/icc.2012.6363817
Google Scholar
[4]
A. M. Fu, S. H. Lan, B. Huang, Z. C. Zhu, Y. Q. Zhang, A Novel Group-Based Handover Authentication Scheme with Privacy Preservation for Mobile WiMAX Networks, IEEE Communications Letters. 16(2012) 1744-1747.
DOI: 10.1109/lcomm.2012.091212.120575
Google Scholar
[5]
H. Almus, E. Brose, K. Rebensburg, kerberos-based EAP method for re-authentication with integrated support for fast handover and IP mobility in wireless LANs, 2008 Second International Conference on Communications and Electronics. (2008).
DOI: 10.1109/cce.2008.4578934
Google Scholar
[6]
J. Choi,S. Jung, A Handover Authentication Using Credentials Based on Chameleon Hashing, IEEE Communications Letters. 14(2010) 54-56.
DOI: 10.1109/lcomm.2010.01.091607
Google Scholar
[7]
K. Yoohwan, R. Wei, J. Ju-Yeon, J. Yingtao, Z. Jun, SFRIC: a secure fast roaming scheme in wireless LAN using ID-based cryptography, 2007 IEEE International Conference on Communications. (2008) 1570-1575.
DOI: 10.1109/icc.2007.263
Google Scholar
[8]
J. Qi, Z. Yuqing, F. Anmin, L. Xuefeng, A Privacy Preserving Handover Authentication Scheme for EAP-Based Wireless Networks, Proceedings of the 2011 IEEE Global Communications Conference. (2011) 6.
DOI: 10.1109/glocom.2011.6133722
Google Scholar
[9]
Burrows M, Abadi M, N. R, A logic of authentication, Proceedings of the Royal Society. (1989).
Google Scholar
[10]
Sufatrio,Y. Roland, Extending BAN logic for reasoning with modern PKI-based protocols, 2008 IFIP International Conference on Network and Parallel Computing. (2008)190-197.
DOI: 10.1109/npc.2008.86
Google Scholar