Login / Signup
Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography.
Debiao He
Sherali Zeadally
Libing Wu
Huaqun Wang
Published in:
Comput. Networks (2017)
Keyphrases
</>
wireless networks
mobile networks
mobile computing
multimedia services
base station
ad hoc networks
wireless communication
public key
mobile devices
public key cryptography
mobile ipv
mobile nodes
key management
authentication protocol
wireless technologies