A Concrete Security Treatment of Symmetric Encryption
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundaries
Security issues in privacy and key management protocols of IEEE 802.16
Proceedings of the 44th annual Southeast regional conference
EAP methods for wireless networks
Computer Standards & Interfaces
A survey on emerging broadband wireless access technologies
Computer Networks: The International Journal of Computer and Telecommunications Networking
Information Sciences: an International Journal
A framework for compositional verification of security protocols
Information and Computation
Server side hashing core exceeding 3 Gbps of throughput
International Journal of Security and Networks
Scheduling in multihop WiMAX networks
ACM SIGMOBILE Mobile Computing and Communications Review
QoS differentiation for IEEE 802.16 WiMAX mesh networking
Mobile Networks and Applications
Proceedings of the 2009 Euro American Conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship
Security vulnerabilities in IEEE 802.22
Proceedings of the 4th Annual International Conference on Wireless Internet
A secure and lightweight approach for routing optimization in mobile IPv6
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Secure roaming of key association scheme providing perfect forward secrecy in IEEE 802.16
CSNA '07 Proceedings of the IASTED International Conference on Communication Systems, Networks, and Applications
Formal analysis of the handover schemes in mobile WiMAX networks
WOCN'09 Proceedings of the Sixth international conference on Wireless and Optical Communications Networks
Towards efficient and secure rekeying for IEEE 802.16e WiMAX networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
State of the art of the wireless security in OFDM(A)-based systems
MWS'09 Proceedings of the 2009 IEEE conference on Mobile WiMAX
Distributed trust relationship and polynomial key generation for IEEE 802.16m networks
MWS'09 Proceedings of the 2009 IEEE conference on Mobile WiMAX
Security issues in mobile WiMAX (IEEE 802.16e)
MWS'09 Proceedings of the 2009 IEEE conference on Mobile WiMAX
WiFi and WiMAX secure deployments
Journal of Computer Systems, Networks, and Communications - Special issue on WiMAX, LTE, and WiFi interworking
Security of IEEE 802.16 in mesh mode
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Novel approaches to enhance mobile WiMAX security
EURASIP Journal on Wireless Communications and Networking - Special issue on multimedia communications over next generation wireless networks
Wireless mesh network security: A traffic engineering management approach
Journal of Network and Computer Applications
Security improvement on a group key exchange protocol for mobile networks
ICCSA'11 Proceedings of the 2011 international conference on Computational science and its applications - Volume Part IV
A handover security mechanism employing diffie-Hellman PKDS for IEEE802.16e wireless networks
ARES'11 Proceedings of the IFIP WG 8.4/8.9 international cross domain conference on Availability, reliability and security for business, enterprise and health information systems
On the exploitation of a high-throughput SHA-256 FPGA design for HMAC
ACM Transactions on Reconfigurable Technology and Systems (TRETS)
On the exploitation of a high-throughput SHA-256 FPGA design for HMAC
ACM Transactions on Reconfigurable Technology and Systems (TRETS)
SP 800-127. Guide to Securing WiMAX Wireless Communications
SP 800-127. Guide to Securing WiMAX Wireless Communications
Insider attacks enabling data broadcasting on crypto-enforced unicast links
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Linear cryptanalysis and security tradeoff of block ciphering systems with channel errors
NSS'12 Proceedings of the 6th international conference on Network and System Security
A hybrid user authentication protocol for mobile IPTV service
Multimedia Tools and Applications
Integrated system for control and monitoring industrial wireless networks for labor risk prevention
Journal of Network and Computer Applications
Mobile Information Systems - Emerging Wireless and Mobile Technologies
Hi-index | 0.00 |
When creating the new wireless communication standard IEEE 802.16, designers attempted to reuse a security scheme designed for wired media. The authors review the standard, enumerate its flaws, and outline changes that could defend it against threats.