Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003
DOI: 10.1109/iscc.2003.1214179
|View full text |Cite
|
Sign up to set email alerts
|

Authenticated access for IPv6 supported mobility

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
13
0

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(13 citation statements)
references
References 11 publications
0
13
0
Order By: Relevance
“…The authenticated and authorized access control needs to be executed before the network access is granted to the MN. The method to provide authenticated access for IPv6 supported mobility was proposed in [11]. Similar concept is applied in our framework.…”
Section: Framework For the Combined Qos Security And Mobility Mementioning
confidence: 99%
“…The authenticated and authorized access control needs to be executed before the network access is granted to the MN. The method to provide authenticated access for IPv6 supported mobility was proposed in [11]. Similar concept is applied in our framework.…”
Section: Framework For the Combined Qos Security And Mobility Mementioning
confidence: 99%
“…The method to provide authenticated access for IPv6 supported mobility was proposed in [7]. A similar concept with a few modifications is applied here in our framework.…”
Section: A the Authenticated Access Control Schemementioning
confidence: 99%
“…One potential problem is whether the hierarchy of MAPs is feasible. In addition, further considerations may need to be given on how the AAA infrastructure could be used to establish temporary security associations between the mobile nodes and the networks they are visiting (Engelstad et al, 2003). Thus, applications that require subsequent authentication may not require signaling between the visited and the home domain.…”
Section: 7mentioning
confidence: 99%