[1]
|
Jaime, F., Josep, M.B., José, N.M. and Frank, Z. (2012) Traffic and Mobility Management in Networks of Femtocells. Mobile Networks and Applications, 17, 662-673. http://dx.doi.org/10.1007/s11036-012-0396-9
|
[2]
|
Broadband Evolved FEMTO Networks (BeFEMTO) Project (2011) The BeFEMTO System Architecture.
http://www.ict-befemto.eu/publications/deliverables.html
|
[3]
|
Zdarsky, F., Maeder, A., Al-Sabea, S. and Schmid, S. (2011) Localization of Data and Control Plane Traffic in Enterprise Femtocell Networks. Proceedings of IEEE 73rd Vehicular Technology Conference (VTC Spring 2011), Budapest, 15-18 May 2011. http://dx.doi.org/10.1109/VETECS.2011.5956622
|
[4]
|
3rd Generation Partnership Project (2012) Technical Specification Group Service and System Aspects; 3GPP System Architecture Evolution (SAE); Security Architecture (Rel 12) 3GPP TS 33.401 V12.6.0.
|
[5]
|
3rd Generation Partnership Project (2011) Technical Specification Group Services and System Aspects; General Packet Radio Service (GPRS) Enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) Access (Rel 10), 3GPP TS 23.401 V10.5.0.
|
[6]
|
3rd Generation Partnership Project (2011) Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN); Overall description; (Rel 10), 3GPP TS 36.300 V10.4.0.
|
[7]
|
Forsberg, D. (2010) LTE Key Management Analysis with Session Keys Context. Computer Communications, 33, 1907-1915. http://dx.doi.org/10.1016/j.comcom.2010.07.002
|
[8]
|
Bohk, A., Buttyn, L. and Dra, L. (2007) An Authentication Scheme for Fast Handover between WiFi Access Points. Proceeding of ACM Wireless Internet Conference (WICON 2007), October, 22-24.
http://dx.doi.org/10.4108/wicon.2007.2282
|
[9]
|
Cai, L., Machiraju, S. and Chen, H. (2010) CapAuth: A Capability-Based Handover Scheme. Proceedings of IEEE INFOCOM 2010, USA, March, 1-5. http://dx.doi.org/10.1109/INFCOM.2010.5462208
|
[10]
|
Jin, C., Hui, L., Maode, M., Yueyu, Z. and Chengzhe, L. (2012) A Simple and Robust Handover Authentication between HeNB and eNB in LTE Networks. Computer Networks, 56, 2119-2131.
http://dx.doi.org/10.1016/j.comnet.2012.02.012
|
[11]
|
Choi, J. and Jung, S. (2010) A Handover Authentication Using Credentials Based on Chameleon Hashing. IEEE Communications Letters, 14, 54-56. http://dx.doi.org/10.1109/LCOMM.2010.01.091607
|
[12]
|
Roh, H. and Jung, S. (2010) RSA-Based Proxy Signature for Media Independent Handover. Proceeding of the First International Conference on Smart IT Applications (SITA 2010), September.
|
[13]
|
Qi, J., Zhang, Y., Fu, A. and Liu, X. (2011) A Privacy Preserving Handover Authentication Scheme for EAP-Based Wireless Networks. Proceeding of GLOBECOM 2011, December, 1-6.
|