2. Han C K, Choi H K, Kim I H. Building femtocell more secure with improved proxy signature. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM’09), Nov 30-Dec 4, 2009, Honolulu, HI, USA. Piscataway, NJ, USA: IEEE, 2009: 6p
3. 3GPP TS 33.401 V11.5.0. 3rd Generation Partnership Project; Technical Specification Group Service and System Aspects; 3GPP System Architecture Evolution (SAE); Security Architecture (Rel 11). 2012
4. 3GPP TS 36.300 V11.3.0. 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN); Overall Description; (Rel 11). 2012
5. Mishra A, Shin M H, Petroni N L, et al. Proactive key distribution using neighbor graphs. IEEE Wireless Communications, 2004, 11(1): 26-36
6. Cai L, Machiraju S, Chen H. CapAuth: a capability-based handover scheme. Proceedings of the 29th Annual Joint Conference of the IEEE Computer and Communications (INFOCOM’10), Mar 14-19, 2010, San Diego, CA, USA. Piscataway, NJ, USA: IEEE, 2010: 5p
7. Kim Y, Ren W, Jo J, et al. SFRIC: a secure fast roaming scheme in wireless LAN using ID-based cryptography. Proceedings of the IEEE International Conference on Communications (ICC’07), Jun 24-28, 2007, Glasgow, UK. Piscataway, NJ, USA: IEEE, 2007: 1570-1575
8. Choi J, Jung S. A handover authentication using credentials based on chameleon hashing. IEEE Communications Letters, 2010, 14(1): 54-56
9. Qi J, Zhang Y, Fu A, et al. A privacy preserving handover authentication scheme for EAP-based wireless networks. Proceedings of the IEEE Global Communications Conference (GLOBECOM’11), Dec 5-9, 2011, Houston, TX, USA. Piscataway, NJ, USA: IEEE, 2011: 6p
10. Yoon E J, Khan M K, Yoo K Y. Cryptanalysis of a handover authentication scheme using credentials based on chameleon hashing. IEICE Transactions on Information and Systems, 2010, E93-D(12): 3400-3402
11. 3GPP TS 22.220 V11.6.0. 3rd Generation Partnership Project; Technical Specification Group Service and System Aspects; Service requirements for Home Node B(HNB) and Home eNode B(HeNB) (Rel 11). 2012
12. Kim S, Park S, Won D. Proxy signatures, revisited. Proceedings of the 1st International Conference on Information and Communication Security (ICICS’97), Nov 11-14, 1997, Beijing, China. 1997: 223-232
13. Schnorr C P. Efficient signature generation by smart cards. Journal of Cryptology, 1991, 4(3): 161-174
14. AVISPA v1.1 user manual. AVISPA, 2006 |