Enhanced inter-ASN handover authentication scheme for IEEE 802.16m network

Faculty Computer Science Year: 2015
Type of Publication: ZU Hosted Pages:
Authors:
Journal: Information Security, IET Institution of Engineering and Technology United Kingdom Volume:
Keywords : Enhanced inter-ASN handover authentication scheme , IEEE    
Abstract:
The 802.16m mobile WiMAX standard is the amendment to the 802.16e standard. It introduced high mobility features that enable mobile broadband services at vehicular speeds beyond 120 km/h. However, handover latency in mobile WiMAX may affe
   
     
 
       

Author Related Publications

  • Walid Ibrahim Ibrahim Khedr, "An end-to-end ID-Based Encryption and Authentication Scheme for Short Message Service in GSM Networks", Advanced Institute of Convergence IT, 2013 More
  • Walid Ibrahim Ibrahim Khedr, "On the Security of Anonymous Authentication Scheme for Mobile LEO Satellite Networks", Advanced Institute of Convergence IT, 2013 More
  • Walid Ibrahim Ibrahim Khedr, "SRFID: A hash-based security scheme for low cost RFID systems", Elsevier, 2013 More
  • Walid Ibrahim Ibrahim Khedr, "On the Security of Moessner’s and Khan’s Authentication Scheme for Passive EPCglobal C1G2 RFID Tags", National Chung Hsing University, 2013 More
  • Walid Ibrahim Ibrahim Khedr, "Improved Lightweight Authentication Scheme For Ieee 802.11P Vehicle-to-Infrastructure Communications", Old City Publishing, Inc., USA, 2015 More

Department Related Publications

  • Walid Ibrahim Ibrahim Khedr, "Improved Lightweight Authentication Scheme For Ieee 802.11P Vehicle-to-Infrastructure Communications", Old City Publishing, Inc., USA, 2015 More
  • Khalied Mohamed Hosny, "Comments on "Robust circularly orthogonal moment based on Chebyshev rational function", Digital Signal Processing, Vol. 62, p. 249-258, 2017.", Elsevier, 2017 More
  • Ehab Roshdy Mohamed, "Solving systems of nonlinear equations via conjugate direction flower pollination algorithm", inderscience, 2017 More
  • Ehab Roshdy Mohamed, "Krill herd algorithm based on cuckoo search for solving engineering optimization problems", # Springer Science+Business Media New York 2017, 2017 More
  • Amir El Sayed Godaa Hassan, "FOUR-PHASE PROTOCOL FOR DETECTION, DELETION, PROTECTION AND RECOVERY FROM AUTORUN VIRUS", Journal of Theoretical and Applied Information Technology, 2018 More
Tweet