Computer Science ›› 2015, Vol. 42 ›› Issue (2): 46-49.doi: 10.11896/j.issn.1002-137X.2015.02.010
Previous Articles Next Articles
LU Wei-feng, YU Ke-yuan and CHEN Si-guang
[1] Daan P,Bart L,Ingrid M,et al.The History of WiMAX:AComplete Survey of the Evolution in Certification and Standardization for IEEE 802.16 and WiMAX[J].IEEE Communications Surveys & Tutorials,2012,4(4):1183-1211 [2] Steven W S,Robert W H.The Future of WiMAX:Multihop Relaying with IEEE 802.16j[J].IEEE Standards in Communication and networking,2009,47(1):104-111 [3] 吴乾.WiMAX无线网络安全接入技术分析[J].技术研发,2013(20):61-70 [4] Perumalraja R,Lung C-H,Anand S.Design of Distributed Security Architecture for Multihop WiMAX Networks[C]∥2010 Eighth Annual International Conference on Privacy Security and Trust.Ottawa,Canada,2010:54-61 [5] LAN/MAN Standards Committee of the IEEE Computer Society,IEEE Microwave Theory and Techniques Society.IEEE Standard for Local and metropolitan area networks Part 16:Air Interface for Broadband Wireless Access Systems Amendment 1:Multihop Relay Specification[S].New York,the Institute of Electrical and Electronics Engineers,2009 [6] Dai Xin-min,Xie Xiao-yao.Analysis and Research of Security Mechanism in IEEE 802.16j [C]∥2010 International Conference on Anti-Counterfeiting Security and Identification in Communication.Chengdu,China,2010:33-36 (下转第54页)(上接第49页) [7] Yang Fan,Qian Ya-li.Two Different Schemes of Authentication in IEEE802.16j Multi-hop Relay Network[C]∥2012 8th International Conference on Wireless Communications,Networking and Mobile Computing.Shanghai,China,2012:1-4 [8] Huang Jie,Huang Chin-Tser.Secure Mutual AuthenticationProtocols for Mobile Multi-hop Relay Wimax Networks against Rogue Base/Relay Stations[C]∥2011 IEEE International Conference on Communications.Kyoto,Japan,2011:1-5 [9] 郎为民,刘波.WiMAX技术原理与应用 [M].北京:机械工业出版社,2008 [10] Anju B,Ramesh P,Chaurasia B K.Traffic Analysis for WiMAX [C]∥2013 5th International Conference on Computational Intelligence and Communication Networks.Mathura,India,2013:138-140 [11] Stuart J.WiMAX Subscriber and Mobile Station Authentication Challenges [J].IEEE communications Magazine,2011,49(11):166-172 [12] Sun Hung-min,Chang Shih-Ying,Lin Yue-Hsun,et al.Efficient Authentication Schemes for Handover in Mobile WiMax [C]∥Eighth International Conference on Intelligent Systems Design and Applications.Kaohsiung,Taiwan,2008,3:235-240 [13] Kleinrock L.Queueing Systems volume 1 [M].New York:A Wiley-Interscience Publication,1975:126-137 |
No related articles found! |
|