Search Results

There are 25514 results for: content related to: Front Matter

  1. Secure handover for Proxy Mobile IPv6 in next-generation communications: scenarios and performance

    Wireless Communications and Mobile Computing

    Volume 11, Issue 2, February 2011, Pages: 176–186, Jong-Hyouk Lee and Tai-Myoung Chung

    Version of Record online : 22 DEC 2009, DOI: 10.1002/wcm.895

  2. Authentication, Authorization, and Accounting

    Next Generation Mobile Systems 3G and Beyond

    Alper E. Yegin, Fujio Watanabe, Pages: 315–343, 2005

    Published Online : 30 JUN 2005, DOI: 10.1002/0470091533.ch11

  3. You have free access to this content
    Local fast re-authentication for 3G-WLAN interworking

    Security and Communication Networks

    Volume 1, Issue 4, July/August 2008, Pages: 309–323, Ali Al Shidhani and Victor C. M. Leung

    Version of Record online : 30 MAY 2008, DOI: 10.1002/sec.30

  4. Authentication across heterogeneous networks

    Bell Labs Technical Journal

    Volume 10, Issue 2, Summer 2005, Pages: 39–56, Miroslav Živković, Milind M. Buddhikot, Ko Lagerberg and Jeroen van Bemmel

    Version of Record online : 3 AUG 2005, DOI: 10.1002/bltj.20093

  5. Evaluation of authentication interworking methods among multiple WLAN service providers

    International Journal of Communication Systems

    Volume 20, Issue 5, May 2007, Pages: 515–531, Wan Yeon Lee and Heejo Lee

    Version of Record online : 9 AUG 2006, DOI: 10.1002/dac.831

  6. Security

    UMTS Networks and Beyond

    Cornelia Kappler, Pages: 127–145, 2009

    Published Online : 12 MAY 2009, DOI: 10.1002/9780470682029.ch13

  7. sRAMP: secure reconfigurable architecture and mobility platform

    Security and Communication Networks

    Volume 4, Issue 4, April 2011, Pages: 395–409, Shao-Hsiu Hung, Jui-Hung Yeh and Jyh-Cheng Chen

    Version of Record online : 11 JAN 2010, DOI: 10.1002/sec.167

  8. Standards Based Security

    Securing Wireless LANs: A Practical Guide for Network Managers, LAN Administrators and the Home Office User

    Gilbert Held, Pages: 183–243, 2004

    Published Online : 21 JUN 2004, DOI: 10.1002/0470869690.ch7

  9. You have free access to this content
    Security and privacy for the next wireless generation

    International Journal of Network Management

    Volume 18, Issue 2, March/April 2008, Pages: 129–145, Pascal Urien and Guy Pujolle

    Version of Record online : 4 JAN 2008, DOI: 10.1002/nem.678

  10. Mobility Optimization Techniques

    Mobility Protocols and Handover Optimization: Design, Evaluation and Application

    Ashutosh Dutta, Henning Schulzrinne, Pages: 149–241, 2014

    Published Online : 28 MAR 2014, DOI: 10.1002/9781119945505.ch6

  11. Security

    Advanced Wireless Networks: Cognitive, Cooperative and Opportunistic 4G Technology, Second Edition

    Savo Glisic, Beatriz Lorenzo, Pages: 623–658, 2009

    Published Online : 5 AUG 2009, DOI: 10.1002/9780470745724.ch15

  12. Secure fast WLAN handoff using time-bound delegated authentication

    International Journal of Communication Systems

    Volume 22, Issue 5, May 2009, Pages: 565–584, Hung-Yu Chien and Tzu-Hang Hsu

    Version of Record online : 19 NOV 2008, DOI: 10.1002/dac.983

  13. Wi-Fi Security

    Wireless and Mobile Network Security: Security Basics, Security in On-the-shelf and Emerging Technologies

    Hakima Chaouchi, Maryline Laurent-Maknavicius, Pages: 231–270, 2010

    Published Online : 5 JAN 2010, DOI: 10.1002/9780470611883.ch7

  14. Enhanced access control in hybrid MANETs through utility-based pre-authentication control

    Wireless Communications and Mobile Computing

    Volume 10, Issue 5, May 2010, Pages: 688–703, Pedro Miguel Ruiz Martinez, Rafael Marin Lopez, Francisco J. Ros and Juan A. Martinez

    Version of Record online : 31 DEC 2008, DOI: 10.1002/wcm.729

  15. Performance evaluation of IKEv2 authentication methods in next generation wireless networks

    Security and Communication Networks

    Volume 3, Issue 1, January/February 2010, Pages: 83–98, Zoltán Faigl, Stefan Lindskog and Anna Brunstrom

    Version of Record online : 13 MAY 2009, DOI: 10.1002/sec.114

  16. Key Management in 802.16e

    WiMAX Security and Quality of Service: AN End-to-End Perspective

    Georgios Kambourakis, Stefanos Gritzalis, Pages: 63–86, 2010

    Published Online : 31 MAY 2010, DOI: 10.1002/9780470665749.ch3

  17. Network Security

    Wireless Mesh Networks

    Ian F. Akyildiz, Xudong Wang, Pages: 137–164, 2009

    Published Online : 11 MAY 2009, DOI: 10.1002/9780470059616.ch6

  18. Network Management and Security

    A Guide to the Wireless Engineering Body of Knowledge

    G. Giannattasio, J. Erfanian, K. D. Wong, P. Wills, H. Nguyen, T. Croda, K. Rauscher, X. Fernando, N. Pavlidou, Pages: 93–126, 2009

    Published Online : 9 MAR 2009, DOI: 10.1002/9780470439128.ch3

  19. A mutual authentication and privacy mechanism for WLAN security

    Wireless Communications and Mobile Computing

    Volume 8, Issue 1, January 2008, Pages: 101–112, Yixin Jiang, Chuang Lin, Hao Yin and Zhen Chen

    Version of Record online : 12 SEP 2006, DOI: 10.1002/wcm.448

  20. Security issues in IEEE 802.11 wireless local area networks: a survey

    Wireless Communications and Mobile Computing

    Volume 4, Issue 8, December 2004, Pages: 821–833, Arunesh Mishra, Nick L. Petroni Jr., William A. Arbaugh and Timothy Fraser

    Version of Record online : 25 NOV 2004, DOI: 10.1002/wcm.257