共 20 条
[1]
Anton B., Bullock B., Short J., Best Current Practices for Wireless Internet Service Provider (WISP) Roaming, Wi-Fi Alliance, (2003)
[2]
Baek S., Pack S., Kwon T., Choi Y., A localized authentication, authorization, and accounting (AAA) protocol for mobile hotspots, Proceedings of the Third Annual Conference on Wireless on Demand Network Systems and Services, Les Ménuires, pp. 144-153, (2006)
[3]
ElGamal T., A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, 31, 4, pp. 469-472, (1985)
[4]
Fang Y., Chlamtac I., Teletraffic analysis and mobility modeling of PCS networks, IEEE Transactions on Communications, 47, 7, pp. 1062-1072, (1999)
[5]
Gaubatz G., Kaps J.P., Sunar B., Public key cryptography in sensor networks - revisited', ESAS, LNCS, 3313, pp. 2-18, (2005)
[6]
Hendry M., Smart Card Security and Applications, (1997)
[7]
Laat C.D., Gross G., Gommans L., Vollbrecht J., Spence D., Generic AAA architecture, (2000)
[8]
Leu J., Lai R., Lin H., Shih W., Running Cellular/PWLAN services: Practical considerations for Cellular/PWLAN architecture supporting interoperator roaming, IEEE Communications Magazine, 44, 2, pp. 73-84, (2006)
[9]
Long M., Wu C.-H., Irwin J.D., Localized authentication for wireless LAN Internetwork roaming, Proceedings of IEEE Wireless Communications and Networking Conference, pp. 264-267, (2004)
[10]
Naghshinel M., Schwartz M., Distributed call admission control in mobile/wireless networks, IEEE Journal on Selected Areas in Communications, 14, 4, pp. 711-717, (1996)