An IBC and certificate based hybrid approach to WiMAX security.
Mete RodoperWade TrappeEdward JungPublished in: J. Commun. Networks (2009)
Keyphrases
- public key infrastructure
- authentication mechanism
- factor authentication
- public key encryption
- security issues
- intrusion detection
- information security
- security mechanisms
- access control
- resource management
- security requirements
- security systems
- computer security
- security policies
- application layer
- network security
- data security
- standard model
- security model
- information systems
- physical layer
- medium access control
- data encryption
- network architecture
- mobile devices