2008 New Technologies, Mobility and Security 2008
DOI: 10.1109/ntms.2008.ecp.87
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis and Security Optimizations for the Context Transfer Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…The authors identify the problems related to seamless mobility, highlight design issues to be observed when designing seamless mobility solutions and propose an architecture that can be used as a framework for the implementation of such solutions. Very recently, the work in Reference [18] focuses on CXTP security and provides a number of solutions regarding its flaws.…”
Section: Previous Work and Problem Statementmentioning
confidence: 99%
“…The authors identify the problems related to seamless mobility, highlight design issues to be observed when designing seamless mobility solutions and propose an architecture that can be used as a framework for the implementation of such solutions. Very recently, the work in Reference [18] focuses on CXTP security and provides a number of solutions regarding its flaws.…”
Section: Previous Work and Problem Statementmentioning
confidence: 99%