The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for IKEv2 with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2003-2007 (23) 2008-2010 (22) 2011-2014 (16) 2015-2018 (15) 2019-2023 (19)
Publication types (Num. hits)
article(67) inproceedings(27) phdthesis(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 33 occurrences of 26 keywords

Results
Found 95 publication records. Showing 95 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
135Kaisa Nyberg IKE in Ad Hoc IP Networking. Search on Bibsonomy ESAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF ad hoc access, ad hoc authentication, ad hoc networking, key management, message authentication code, peer-to-peer communication, security association, IKEv2
131Lari Iso-Anttila, Jorma Ylinen, Pekka Loula A Proposal to Improve IKEv2 negotiation. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
94Mohammad Mahdi Karbasioun, Mehdi Berenjkub, Bahareh Taji A Modified Version of IKEv2 for Using in Client-Server Environments. Search on Bibsonomy CNSR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Signature, Client-Server, IKEv2, DoS attack
92Ningning Lu, Huachun Zhou, Yajuan Qin A comparison study of IKE protocols. Search on Bibsonomy Mobility Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IKEv1, authentication keywords, pre-shared-key, cookie, IKEv2
67Paulo S. Pagliusi, Chris J. Mitchell PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access. Search on Bibsonomy WISA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
64Paul Fleischer, Lars Michael Kristensen Formal Specification and Validation of Secure Connection Establishment in a Generic Access Network Scenario. Search on Bibsonomy Petri Nets The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
48Tristan Ninet Formal verification of the Internet Key Exchange (IKEv2) security protocol. (Vérification formelle du protocole d'échange de clé IKEv2). Search on Bibsonomy 2020   RDF
48Violeta Cakulev, Avi Lior, Semyon Mizikovsky Diameter IKEv2 SK: Using Shared Keys to Support Interaction between IKEv2 Servers and Diameter Servers. Search on Bibsonomy RFC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
43Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld DoS protection for UDP-based protocols. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF buffer exhaustion, network security, DoS, denial of service, fragmentation, IPsec, protocol design, IKE
27Pedro Javier Fernández Ruiz, Cristian A. Nieto Guerra, Antonio Fernandez Gómez-Skarmeta Deployment of a Secure Wireless Infrastructure Oriented to Vehicular Networks. Search on Bibsonomy AINA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Open-Source Implementation, Mobility, Authentication, WiMAX, Vehicular Networks, IPsec, EAP, IKEv2
27Serkan Ayaz, Christian Bauer 0002, Max Ehammer Applying IKE/IPsec context transfer to aeronautical networks. Search on Bibsonomy MOBIWAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cxtp, ipsec, network mobility, aviation, ikev2
27Christos Xenakis, Christoforos Ntantogian Security architectures for B3G mobile networks. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF B3G networks, EAP-SIM, EAP-AKA, WLAN, 3G, 802.11i, IKEv2
24Paul Wouters, Sahana Prasad Labeled IPsec Traffic Selector Support for the Internet Key Exchange Protocol Version 2 (IKEv2). Search on Bibsonomy RFC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Valery Smyslov Using GOST Cryptographic Algorithms in the Internet Key Exchange Protocol Version 2 (IKEv2). Search on Bibsonomy RFC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Mohamed Boucadair, T. Reddy K., Dan Wing, Valery Smyslov Internet Key Exchange Protocol Version 2 (IKEv2) Configuration for Encrypted DNS. Search on Bibsonomy RFC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Cen Jung Tjhai, Martin Tomlinson, Graham Bartlett, Scott R. Fluhrer, Daniel Van Geest, Óscar García-Morchón, Valery Smyslov Multiple Key Exchanges in the Internet Key Exchange Protocol Version 2 (IKEv2). Search on Bibsonomy RFC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Sophie Stevens Formal verification of the post-quantum security properties of IKEv2 PPK (RFC 8784) using the Tamarin Prover. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
24Myeongji Ko, Hyogon Kim, Sung-Gi Min An IKEv2-Based Hybrid Authentication Scheme for Simultaneous Access Network and Home Network Authentication. Search on Bibsonomy IEICE Trans. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Valery Smyslov Intermediate Exchange in the Internet Key Exchange Protocol Version 2 (IKEv2). Search on Bibsonomy RFC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Valery Smyslov Using GOST Ciphers in the Encapsulating Security Payload (ESP) and Internet Key Exchange Version 2 (IKEv2) Protocols. Search on Bibsonomy RFC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Mohamed Boucadair Internet Key Exchange Protocol Version 2 (IKEv2) Notification Status Types for IPv4/IPv6 Coexistence. Search on Bibsonomy RFC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Stefan-Lukas Gazdag, Sophia Grundner-Culemann, Tobias Guggemos, Tobias Heider, Daniel Loebenberger A formal analysis of IKEv2's post-quantum extension. Search on Bibsonomy ACSAC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Scott R. Fluhrer, Panos Kampanakis, David A. McGrew, Valery Smyslov Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security. Search on Bibsonomy RFC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Sven Schäge, Jörg Schwenk, Sebastian Lauer Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
24Sven Schäge, Jörg Schwenk, Sebastian Lauer Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Shahid Raza, Runar Mar Magnusson TinyIKE: Lightweight IKEv2 for Internet of Things. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Kiki Rizki, Argyro Lamproudi, Marco Tiloca, Shahid Raza Group-IKEv2 for multicast IPsec in the internet of things. Search on Bibsonomy Int. J. Secur. Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Tommy Pauly, Paul Wouters Split DNS Configuration for the Internet Key Exchange Protocol Version 2 (IKEv2). Search on Bibsonomy RFC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Tristan Ninet, Axel Legay, Romaric Maillard, Louis-Marie Traonouez, Olivier Zendra The Deviation Attack: A Novel Denial-of-Service Attack Against IKEv2. Search on Bibsonomy TrustCom/BigDataSE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Tristan Ninet, Axel Legay, Romaric Maillard, Louis-Marie Traonouez, Olivier Zendra Model Checking the IKEv2 Protocol Using Spin. Search on Bibsonomy PST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Yoav Nir Using the Edwards-Curve Digital Signature Algorithm (EdDSA) in the Internet Key Exchange Protocol Version 2 (IKEv2). Search on Bibsonomy RFC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Yanpeng Cui, Ting Yu, Jianwei Hu 0002 IKEv2 Protocol Fuzzing Test on Simulated ASA. Search on Bibsonomy SmartIoT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24M. Lavanya, V. Natarajan Lightweight key agreement protocol for IoT based on IKEv2. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Yoav Nir, Tero Kivinen, Paul Wouters, Daniel Migault Algorithm Implementation Requirements and Usage Guidance for the Internet Key Exchange Protocol Version 2 (IKEv2). Search on Bibsonomy RFC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Nils gentschen Felde, Tobias Guggemos, Tobias Heider, Dieter Kranzlmüller Secure group key distribution in constrained environments with IKEv2. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Tero Kivinen, Paul Wouters, Hannes Tschofenig Generic Raw Public-Key Support for IKEv2. Search on Bibsonomy RFC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Yoav Nir, Valery Smyslov Protecting Internet Key Exchange Protocol Version 2 (IKEv2) Implementations from Distributed Denial-of-Service Attacks. Search on Bibsonomy RFC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Daniel Migault, Valery Smyslov Cloning the IKE Security Association in the Internet Key Exchange Protocol Version 2 (IKEv2). Search on Bibsonomy RFC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Tero Kivinen Minimal Internet Key Exchange Version 2 (IKEv2) Initiator Implementation. Search on Bibsonomy RFC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Yoav Nir, Simon Josefsson Curve25519 and Curve448 for the Internet Key Exchange Protocol Version 2 (IKEv2) Key Agreement. Search on Bibsonomy RFC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Jay Bryan R. Lawas, Allan C. Vivero, Ankit Sharma Network performance evaluation of VPN protocols (SSTP and IKEv2). Search on Bibsonomy WOCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Kostas Pentikousis, Emma Zhang, Yang Cui IKEv2-Derived Shared Secret Key for the One-Way Active Measurement Protocol (OWAMP) and Two-Way Active Measurement Protocol (TWAMP). Search on Bibsonomy RFC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Tero Kivinen, Joel Snyder Signature Authentication in the Internet Key Exchange Version 2 (IKEv2). Search on Bibsonomy RFC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Aeneas Dodd-Noble, Sri Gundavelli, Jouni Korhonen, Florin Baboescu, Brian Weis 3GPP IP Multimedia Subsystems (IMS) Option for the Internet Key Exchange Protocol Version 2 (IKEv2). Search on Bibsonomy RFC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Valery Smyslov, Paul Wouters The NULL Authentication Method in the Internet Key Exchange Protocol Version 2 (IKEv2). Search on Bibsonomy RFC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Do Hyeon Lee, Jeom Goo Kim IKEv2 authentication exchange model and performance analysis in mobile IPv6 networks. Search on Bibsonomy Pers. Ubiquitous Comput. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
24Bruno Faria 0002, Jouni Korhonen, Eduardo Souto A comparison study between the TLS-based security framework and IKEv2 when protecting DSMIPv6 signaling. Search on Bibsonomy Comput. Stand. Interfaces The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
24Charlie Kaufman, Paul E. Hoffman, Yoav Nir, Pasi Eronen, Tero Kivinen Internet Key Exchange Protocol Version 2 (IKEv2). Search on Bibsonomy RFC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
24Valery Smyslov Internet Key Exchange Protocol Version 2 (IKEv2) Message Fragmentation. Search on Bibsonomy RFC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
24Xiaojin Yang, Jianhua Liu The Implementation of IKEV2 for IPSec. Search on Bibsonomy CloudComp The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
24Yoav Nir, Qin Wu An Internet Key Exchange Protocol Version 2 (IKEv2) Extension to Support EAP Re-authentication Protocol (ERP). Search on Bibsonomy RFC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24Yaron Sheffer, Scott R. Fluhrer Additional Diffie-Hellman Tests for the Internet Key Exchange Protocol Version 2 (IKEv2). Search on Bibsonomy RFC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24Johannes Merkle, Manfred Lochter Using the Elliptic Curve Cryptography (ECC) Brainpool Curves for the Internet Key Exchange Protocol Version 2 (IKEv2). Search on Bibsonomy RFC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24Ahmad AlSa'deh, Christoph Meinel, Florian Westphal, Marian Gawron, Björn Groneberg CGA integration into IPsec/IKEv2 authentication. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24Dennis Kügler, Yaron Sheffer Password Authenticated Connection Establishment with the Internet Key Exchange Protocol version 2 (IKEv2). Search on Bibsonomy RFC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24SeongHan Shin, Kazukuni Kobara Efficient Augmented Password-Only Authentication and Key Exchange for IKEv2. Search on Bibsonomy RFC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Tero Kivinen Secure Password Framework for Internet Key Exchange Version 2 (IKEv2). Search on Bibsonomy RFC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Raj Singh, G. Kalyani, Yoav Nir, Yaron Sheffer, Dacheng Zhang Protocol Support for High Availability of IKEv2/IPsec. Search on Bibsonomy RFC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Pedro Javier Fernández Ruiz, Antonio F. Skarmeta Providing security using IKEv2 in a vehicular network based on WiMAX technology. Search on Bibsonomy CCNC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Cas Cremers Key Exchange in IPsec Revisited: Formal Analysis of IKEv1 and IKEv2. Search on Bibsonomy ESORICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Yaron Sheffer, Hannes Tschofenig Internet Key Exchange Protocol Version 2 (IKEv2) Session Resumption. Search on Bibsonomy RFC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Charlie Kaufman, Paul E. Hoffman, Yoav Nir, Pasi Eronen Internet Key Exchange Protocol Version 2 (IKEv2). Search on Bibsonomy RFC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Sean Shen, Yu Mao, N. Siva Srinivasa Murthy Using Advanced Encryption Standard Counter Mode (AES-CTR) with the Internet Key Exchange version 02 (IKEv2) Protocol. Search on Bibsonomy RFC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Pasi Eronen, Julien Laganier, Cheryl Madson IPv6 Configuration in Internet Key Exchange Protocol Version 2 (IKEv2). Search on Bibsonomy RFC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Pasi Eronen, Hannes Tschofenig, Yaron Sheffer An Extension for EAP-Only Authentication in IKEv2. Search on Bibsonomy RFC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Emre Ertekin, Chris Christou, Rohan Jasani, Tero Kivinen, Carsten Bormann IKEv2 Extensions to Support Robust Header Compression over IPsec. Search on Bibsonomy RFC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24David E. Fu, Jerome A. Solinas Elliptic Curve Groups modulo a Prime (ECP Groups) for IKE and IKEv2. Search on Bibsonomy RFC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Yoav Nir, Hannes Tschofenig, Hui Deng, Rajeshwar Singh A Childless Initiation of the Internet Key Exchange Version 2 (IKEv2) Security Association (SA). Search on Bibsonomy RFC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Zoltán Faigl, Stefan Lindskog, Anna Brunström Performance evaluation of IKEv2 authentication methods in next generation wireless networks. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Vijay Devarapalli, Kilian Weniger Redirect Mechanism for the Internet Key Exchange Protocol Version 2 (IKEv2). Search on Bibsonomy RFC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Peng Yang, Yuanchen Ma, Satoshi Yoshizawa Fast Re-estabilishment of IKEv2 Security Associations for Recovery of IPsec Gateways in Mobile Network. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
24Alejandro Pérez-Méndez, Pedro Javier Fernández Ruiz, Rafael Marín López, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta, Kenichi Taniuchi OpenIKEv2: Design and Implementation of an IKEv2 Solution. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Hannes Tschofenig, Dirk Kröselberg, Andreas Pashalidis, Yoshihiro Ohba, Florent Bersani The Extensible Authentication Protocol-Internet Key Exchange Protocol version 2 (EAP-IKEv2) Method. Search on Bibsonomy RFC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24David L. Black 0001, David A. McGrew Using Authenticated Encryption Algorithms with the Encrypted Payload of the Internet Key Exchange version 2 (IKEv2) Protocol. Search on Bibsonomy RFC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Vijay Devarapalli, Pasi Eronen Secure Connectivity and Mobility Using Mobile IPv4 and IKEv2 Mobility and Multihoming (MOBIKE). Search on Bibsonomy RFC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Vijay Devarapalli, Francis Dupont Mobile IPv6 Operation with IKEv2 and the Revised IPsec Architecture. Search on Bibsonomy RFC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Michael Myers, Hannes Tschofenig Online Certificate Status Protocol (OCSP) Extensions to IKEv2. Search on Bibsonomy RFC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24David E. Fu, Jerome A. Solinas IKE and IKEv2 Authentication Using the Elliptic Curve Digital Signature Algorithm (ECDSA). Search on Bibsonomy RFC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24David E. Fu, Jerome A. Solinas ECP Groups For IKE and IKEv2. Search on Bibsonomy RFC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Brian Korver The Internet IP Security PKI Profile of IKEv1/ISAKMP, IKEv2, and PKIX. Search on Bibsonomy RFC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Zoltán Faigl, Stefan Lindskog, Anna Brunström Analyzing IKEv2 Performance when Protecting Mobile IPv6 Signaling. Search on Bibsonomy ISWCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Fabio Maino, David L. Black 0001 Use of IKEv2 in the Fibre Channel Security Association Management Protocol. Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Tero Kivinen, Hannes Tschofenig Design of the IKEv2 Mobility and Multihoming (MOBIKE) Protocol. Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Pasi Eronen IKEv2 Mobility and Multihoming Protocol (MOBIKE). Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Pasi Eronen, Paul E. Hoffman IKEv2 Clarifications and Implementation Guidelines. Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Yoav Nir Repeated Authentication in Internet Key Exchange (IKEv2) Protocol. Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Pasi Eronen, Jouni Korhonen Multiple Authentication Exchanges in the Internet Key Exchange (IKEv2) Protocol. Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Jeffrey I. Schiller Cryptographic Algorithms for Use in the Internet Key Exchange Version 2 (IKEv2). Search on Bibsonomy RFC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Charlie Kaufman Internet Key Exchange (IKEv2) Protocol. Search on Bibsonomy RFC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Steffen Schulz 0001, Ahmad-Reza Sadeghi Secure VPNs for Trusted Computing Environments. Search on Bibsonomy TRUST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Khaled Masmoudi, Hossam Afifi Building identity-based security associations for provider-provisioned virtual private networks. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IPsec security associations, Internet key exchange protocol, Provider-provisioned VPNs, Applied identity-based cryptography
21Arnab Roy 0001, Anupam Datta, John C. Mitchell Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols. Search on Bibsonomy TGC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Julien Bournelle, Jean Michel Combes, Maryline Laurent-Maknavicius, Sondes Larafa Using PANA for Mobile IPv6 Bootstrapping. Search on Bibsonomy Networking The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Muhammad Sher, Thomas Magedanz 3G-WLAN Convergence: Vulnerability, Attacks Possibilities and Security Model. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Yu-Ching Hsu, Pai-Feng Tsai A Practical Mechanism for Vertical Handoff in WLAN/3G Integrated Networks. Search on Bibsonomy VTC Spring The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #95 of 95 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license