How to construct pseudorandom permutations from pseudorandom functions
SIAM Journal on Computing - Special issue on cryptography
The Security of Cipher Block Chaining
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Provable Security of KASUMI and 3GPP Encryption Mode f8
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Interworking techniques and architectures for WLAN/3G integration toward 4G mobile data networks
IEEE Wireless Communications
A self-adaptive service provisioning framework for 3G+/4G mobile applications
IEEE Wireless Communications
Security aspects of 3G-WLAN interworking
IEEE Communications Magazine
Policy-based QoS-management architecture in an integrated UMTS and WLAN environment
IEEE Communications Magazine
Hi-index | 0.00 |
This paper considers the global communication environment of B3G wireless networks when integrating security mechanism of two wireless networks, WLAN and 3G cellular networks. As a result, the existing integration paradigms are extended to a more realistic network model for B3G based on dividing the cellular network into the visited network and the home network. Also, we presents a security analysis based on a formal model of the cryptographic mechanisms.