2008 IEEE Asia-Pacific Services Computing Conference 2008
DOI: 10.1109/apscc.2008.194
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Efficient Handover Schemes for Heterogeneous Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0
2

Year Published

2011
2011
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 3 publications
0
8
0
2
Order By: Relevance
“…Second, they do not require major changes to the existing interworking architecture as is the case in [12] and [20]. Third, they demonstrate adequate efficiency without compromising security contrary to [17]. Lastly, they do not depend on MIH services unlike the solutions in [9], [15], and [17].…”
Section: Related Workmentioning
confidence: 98%
See 3 more Smart Citations
“…Second, they do not require major changes to the existing interworking architecture as is the case in [12] and [20]. Third, they demonstrate adequate efficiency without compromising security contrary to [17]. Lastly, they do not depend on MIH services unlike the solutions in [9], [15], and [17].…”
Section: Related Workmentioning
confidence: 98%
“…Third, they demonstrate adequate efficiency without compromising security contrary to [17]. Lastly, they do not depend on MIH services unlike the solutions in [9], [15], and [17].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The AKA protocol was verified by formal methods and Casper/FDR tool and these methods have proved that AKA protocol provide the security in vertical handover. In [11] author proposed seamless handover mechanism between Wi-Fi and Wi-Max networks to reduce authentication process. This mechanism also involves security that guarantee the handover message to be secure.…”
Section: Surveymentioning
confidence: 99%