Login / Signup
Use of EAP-AKA, IETF Hokey and AAA Mechanisms to Provide Access and Handover Security and 3G-802.16M Interworking.
Madjid Nakhjiri
Published in:
PIMRC (2007)
Keyphrases
</>
access control
information systems
intrusion detection
network security
security requirements