[go: up one dir, main page]

Komarova et al., 2006 - Google Patents

Wireless Network Architecture to Support Mobile Users.

Komarova et al., 2006

View PDF
Document ID
8515200819041398679
Author
Komarova M
Riguidel M
Publication year
Publication venue
WINSYS

External Links

Snippet

In this paper we propose a compound method for user authentication in a public access wireless LAN when the latter requires separate authorization to access internal network services and the Internet. The approach we develop aims to minimize a risk of attacks at …
Continue reading at www.academia.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
US7286671B2 (en) Secure network access method
Bargh et al. Fast authentication methods for handovers between IEEE 802.11 wireless LANs
Buddhikot et al. Design and implementation of a WLAN/CDMA2000 interworking architecture
KR100807652B1 (en) Framework of media-independent pre-authentication support for pana
KR100602260B1 (en) Fast Handover Method
US20080026724A1 (en) Method for wireless local area network user set-up session connection and authentication, authorization and accounting server
US7130286B2 (en) System and method for resource authorizations during handovers
EP1693995B1 (en) A method for implementing access authentication of wlan user
Shah et al. A TOTP‐Based Enhanced Route Optimization Procedure for Mobile IPv6 to Reduce Handover Delay and Signalling Overhead
Yegin et al. Protocol for carrying authentication for network access (PANA) requirements
WO2006102565A2 (en) Optimized derivation of handover keys in mobile ipv6
Schmid et al. An access control architecture for microcellular wireless IPv6 networks
Wang et al. Integration of authentication and mobility management in third generation and WLAN data networks
Georgiades et al. Security of context transfer in future wireless communications
Komarova et al. Wireless Network Architecture to Support Mobile Users.
Said et al. A Comparative Study on Security implementation in EPS/LTE and WLAN/802.11
Moustafa Providing authentication, trust, and privacy in wireless mesh networks
Li et al. A proxy based authentication localisation scheme for handover between non trust-associated domains
Chakrabarti et al. Enterprise mobility
Zhang Interworking security in heterogeneous wireless IP networks
Xu Building mobile L2TP/IPsec tunnels
Komarova et al. Secure User’s Mobility: the current situation
Marin-Lopez et al. RFC 9820 Authentication Service Based on the Extensible Authentication Protocol (EAP) for Use with the Constrained Application Protocol (CoAP)
Chaouchi et al. Signalling analysis in integrated 4G networks
Yogi et al. A Systematic Review of Security Protocols for Ubiquitous Wireless Networks