Amanote Research

Amanote Research

    RegisterSign In

Security Challenges in Seamless Mobility: How to "Handover" the Keys?

doi 10.4108/icst.wicon2008.4790
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2008

Authors
Katrin HoeperLidong ChenAntonio IzquierdoNada Golmie
Publisher

ICST


Related search

Seamless Handover in Software-Defined Satellite Networking

IEEE Communications Letters
Electronic EngineeringSimulationComputer Science ApplicationsElectricalModeling
2016English

Group Mobility Handover in Mobile Wimax Network

International Journal of Advance Engineering and Research Development
2015English

A Study on Enhanced Cross-Layering Handover Scheme for Supporting Seamless Routing to PMIPv6 Networks

2017English

How Can We Exploit Above–belowground Interactions to Assist in Addressing the Challenges of Food Security?

Frontiers in Plant Science
Plant Science
2013English

Security/ Mobility

2017English

Mobility Management for Seamless Information Flow in a Heterogeneous Networks

Journal of Computer Science
Computer NetworksSoftwareArtificial IntelligenceCommunications
2011English

Seamless Handover for High-Speed Trains Using Femtocell-Based Multiple Egress Network Interfaces

IEEE Transactions on Wireless Communications
Electronic EngineeringApplied MathematicsComputer Science ApplicationsElectrical
2014English

Handover Optimization for Host and Network Mobility

2006English

Multilevel Security Model Using Distributed Keys in MANET

International Journal of Computer Applications
2013English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy