SEARCH

SEARCH BY CITATION

REFERENCES

  • 1
    Johnson D, Perkins C, Arkko J. Mobility support in IPv6. Internet RFC: RFC3775, June 2004.
  • 2
    Li R, Li J, Wu K, et al. An enhanced fast handover with low latency for mobile IPv6. IEEE Transactions on Wireless Communications 2008; 334342.
  • 3
    Koodli R. Fast handovers for mobile IPv6. RFC 4068, July 2005.
  • 4
    Soliman H, Castelluccia C, El Malki K, et al. Hierarchical mobile IPv6 mobility management (HMIPv6). RFC 4140, August 2005.
  • 5
    Farinacci D, Fuller V, et al. Internet Draft: Locator/ID Separation Protocol (LISP). draft-farinacci-LISP-05, September 2009.
  • 6
    Pan J, Jain R, Paul S, et al. MILSA: a new evolutionary architecture for scalability, mobility, and multihoming in the future internet. IEEE Journal on Selected Areas in Communications 2003; 13441362.
  • 7
    Liang M. A method for vector network address coding [P]. China.CN1866972[P], June 2006.
  • 8
    Le F, Patil B, Perkins CE, et al. Diameter mobile IPv6 application [S]. Internet IETF Draft, draft-aaa-diameter mobileipv6-04, 2004.
  • 9
    Engelstad P, Haslestad T, Paint F. Authenticated access for IPv6 supported mobility. In Proc. IEEE International Symposium on Computers and Communication, 2003; 569575.
  • 10
    Kim C, Kim YS, Huh EN, et al. Performance improvement in mobile IPv6 using AAA and fast handoff. International Conference on Computational Science and Its Applications(ICCSA 2004), 2004; 738745.
  • 11
    Aboba B, Simon D. PPP EAP TLS Authentication Protocol. RFC2716, October 1999.
  • 12
    Rives RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystem. Commun ACM, 1978; 120126.
  • 13
    Boneh D, Franklin M. Identity based encryption from the Weil pairing. Advances in Cryptology–CRYPTO'01(21st Annual International Cryptology Conference), LNCS2139, Springer, 2001.
  • 14
    Boneh D, Lynn B, Shacham H. Short signatures from the Weil pairing. Advances in Cryptology–CRYPTO'01(21st Annual International Cryptology Conference), LNCS2248, Springer, 2001.
  • 15
    Gentry C, Silverberg A. Hierarchical ID-based cryptography. Advances in Cryptolcgy-Aisacrypt' 02. LNCS2501. Springer, Heidelberg, 2002; 548566.
  • 16
    Zhang L, Hu Y, Wu Q. New construction of short hierarchical ID-based signature in the standard model. Fundamenta Informaticae 2009; 90: 191201.
  • 17
    Boneh D, Boyen X, Goh EJ. Hierarchical identity based encryption with constant size ciphertext. Advances in Cryptology–EUROCRYPT 2005(24th Annual International Conference on the Theory and Applications of Cryptographic Techniques), LNCS 3494, Springer, 2005; 440456.
  • 18
    Tian Y, Zhang Y, Zhang H, et al. Identity-based hierarchical access authentication in mobile IPv6 networks. IEEE ICC 2006, 2006; 19531958.
  • 19
    Zhang J, Zhang Y, Zhang H, Sun Y, Li Z. Trust-based fast authentication for mobile IPv6 networks. IEEE Globecom 2008, 2008.
  • 20
    Tian Y, Zhang Y, Liu Y, et al. A fast authentication mechanism using identity based signature in mobile IPv6 network. Chinese Journal of Computers 2007; 17(9): 19801988.
  • 21
    Dang L, Kou W, Li H, et al. Efficient ID-based registration protocol featured with user anonymity in mobile IP networks. IEEE Transactions on Wireless Communications, February 2010; 594604.
  • 22
    Wang ZW, Liang MG, Jia WK et al. A novel optical code-based label switching architecture for WDM packet switched networks. Journal of Internet Technology 2010; 11: 10231029.
  • 23
    The ATM Forum. Private network–network interface specification version 1.1. 2002.
  • 24
    Cheng Y-H, Lin Y-H, Kao S-J. Incorporating MIP and SIP for cross-layer fast handoff in IPv6 networks. Journal of Internet Technology 2010; 509517.
  • 25
    Misra IS, Banerjee A. A novel load sensitive algorithm for AP selection in 4 G networks. CODEC 2003, 2003.
  • 26
    Barreto PSLM, Kim HY, Lynn B, et al. Efficient algorithms for pairing-based cryptosystems. Advances in Cryptology-Crypto, LNCS 2442, Springer-Verlag, 2002; 354368.
  • 27
    Scott M. Computing the Tate pairing. In Proc. RSA Conference Cryptographers' Track (CT-RSA), LNCS 3376, Springer-Verlag, 2005; 293304.
  • 28
    Scott M. Multiprecision integer and rational arithmetic C/C++ library (MIRACL). Available at http://indigo.ie/mscott/
  • 29
    He D, Bu J, Chan S, et al. Privacy-preserving universal authentication protocol for wireless communications. IEEE Transactions on Wireless Communications 2011; 10(2): 431436.