Interconnections (2nd ed.): bridges, routers, switches, and internetworking protocols
Interconnections (2nd ed.): bridges, routers, switches, and internetworking protocols
An algorithm for distributed computation of a spanningtree in an extended LAN
SIGCOMM '85 Proceedings of the ninth symposium on Data communications
Pre-Authenticated Fast Handoff in a Public Wireless LAN Based on IEEE 802.1x Model
PWC '02 Proceedings of the IFIP TC6/WG6.8 Working Conference on Personal Wireless Communications
An empirical analysis of the IEEE 802.11 MAC layer handoff process
ACM SIGCOMM Computer Communication Review
Fast handovers and context transfers in mobile networks
ACM SIGCOMM Computer Communication Review - Special issue on wireless extensions to the internet
Characterizing mobility and network usage in a corporate wireless local-area network
Proceedings of the 1st international conference on Mobile systems, applications and services
Hi-index | 0.00 |
In this paper we design and implement the system that diagnoses security vulnerability in mobile IP networks. The aim of the paper is to interpret the communication network related to security vulnerability reporting process, and focuses on how the information of the vulnerability is received and processed and how the information is managed after the reception in mobile IP networks.