[1]
Tuan-Che Chen, Jyh-Cheng Chen, Zong-Hua Liu, Secure Network Mobility for Real-Time Applications, IEEE Trans. Mobile Computing, vol. 10, No. 8, August (2011).
Google Scholar
[2]
Chung-Ming Huang, Chao-Hsien Lee, and Ji-Ren Zheng A Novel SIP-Based Route Optimization for Network Mobility, IEEE Journal on Selected Areas In Communications, VOL. 24, NO. 9, September (2006).
DOI: 10.1109/iscc.2006.146
Google Scholar
[3]
V. Devarapalli, R. Wakikawa, A. Petrescu, and P. Thubert, Network Mobility Basic Support Protocol, IETF RFC 3963, Jan. (2005).
DOI: 10.17487/rfc3963
Google Scholar
[4]
C.E. Perkins, IP Mobility Support for IPv4, IETF RFC 3344, (2002).
Google Scholar
[5]
S. Vaarala and E. Klovning, Mobile Ipv4 Traversal across IPsec Based VPN Gateways, IETF RFC 5265, June (2008).
DOI: 10.17487/rfc5265
Google Scholar
[6]
S.C. Huang, Z.H. Liu and J.C. Chen, SIP-Based Mobile VPN for Real-Time Applications, " Proc. IEEE Wireless Comm. And Networking Conf. (WCNC , 05), pp.2318-2323, Mar. (2005).
DOI: 10.1109/wcnc.2005.1424877
Google Scholar
[7]
Z.H. Liu, J. C. Chen and T.C. Chen, Design and Analysis of SIP-Based Mobile VPN for Real-Time Applications, IEEE Trans. Wireless Comm., vol. 8, no. 11, pp.5650-5661, Nov. (2009).
DOI: 10.1109/twc.2009.090076
Google Scholar
[8]
S. Kent and R. Atkinson, Security Architecture for the Internet Protocol, IETF RFC 2401, Nov. (1998).
Google Scholar
[9]
J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, E. Scholar, SIP: Session Initiation Protocol, IETF RFC 3261, June (2002).
DOI: 10.17487/rfc3261
Google Scholar
[10]
D. Harkins and D. Carrel, The Internet Key Exchange (IKE), IETF RFC 2409, Nov. (1998).
Google Scholar
[11]
J. C. Chen, Y. W . Liu and L. -W. Lin, Mobile Virtual Private Networks with Dynamic MIP Home Agent Assignment, Wireless Comm. And Mobile Computing, vol. 6, no. 5, pp.601-616, Aug. (2006).
DOI: 10.1002/wcm.413
Google Scholar
[12]
J. C. Chen, J. C. Liang, S. T. Wang, S. Y. Pan, Y. S. Chen and Y. Y. Chen, Fast Handoff in Mobile Virtual Private Networks, " Proc. IEEE Int'l Symp. World of Wireless Mobile and Multimedia Networks (WoWMoM , 06), pp.548-552, June (2006).
DOI: 10.1109/wowmom.2006.47
Google Scholar
[13]
D. Collins, Carrier Grade Voice over IP, second ed. McGraw-Hill, Sept. (2002).
Google Scholar
[14]
S. Fu, M. Atiquzzaman, L. Ma, and Y.J. Lee, Signaling cost and performance of SIGMA: A seamless handover scheme for data networks, Wireless Comm. And Mobile Computing, vol. 5, no. 7, pp.825-845, Nov. (2005).
DOI: 10.1002/wcm.340
Google Scholar
[15]
D. Geneiatakis, T. Dagiuklas, G. Kambourakis, C. Lambrinoudakis, and S. Gritzalis, Survey Of Security Vulnerabilities In Session Initiation Protocol, IEEEComm. Surveys Tutorials, vol. 8, no. 3, pp.68-81, Apr-June (2006).
DOI: 10.1109/comst.2006.253270
Google Scholar
[16]
J. Xie and I. F. Akyildiz A Novel Distributed Dynamic Location Management Scheme for Minimizing Signaling Costs in Mobile IP, IEEE Trans. Mobile Computing, vol. 1, no. 3, pp.163-175, July-Sep. (2002).
DOI: 10.1109/tmc.2002.1081753
Google Scholar