Abstract | ||
---|---|---|
WiMAX security has two goals, one is to provide privacy across the wireless network and the other is to provide access control to the network. The security sub-layer of IEEE 802.16 employs an authenticated client/server key management protocol in which ... |
Year | DOI | Venue |
---|---|---|
2008 | 10.1109/ISCSCT.2008.175 | ISCSCT (1) |
Keywords | Field | DocType |
security sub-layer,access control,wireless network,wimax security,application layer multicast,authenticated client,server key management protocol,delivery tree building approach,depth first search,pediatrics,topology,stress,multicast | Distributed File System,Distance measurement,Application layer,Delivery Performance,Computer science,Computer network,Multicast communication,Multicast,Distributed computing | Conference |
Citations | PageRank | References |
0 | 0.34 | 9 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Xinchang Zhang | 1 | 58 | 11.51 |
Xiaodong Li | 2 | 55 | 3.89 |
Zheng Wang | 3 | 630 | 93.98 |
BaoPing Yan | 4 | 118 | 22.81 |