Login / Signup

Use of EAP-AKA, IETF Hokey and AAA Mechanisms to Provide Access and Handover Security and 3G-802.16M Interworking.

Madjid Nakhjiri
Published in: PIMRC (2007)
Keyphrases
  • access control
  • information systems
  • intrusion detection
  • network security
  • security requirements