|
[1]L. Adleman and R. Rivest, “The use of public key cryptography in communication system design,” IEEE Communications Magazine, Vol. 16, Issue 6, Nov. 1978, pp. 20-23. [2]B. Braden, L. Zhang, S. Berson, S. Herzog, S. Jamin, “Resource ReSerVation Protocol (RSVP)-version 1 Functional Specificaton,” IETC RFC 2205, 1997. [3]A. De Carolis et al., “QoS-Aware handover for Mobile IP: Secondary Home Agent,” from http://www.watersprings.org/pub/id/draft-decarolis-qoshandover-02.txt, 2002. [4]CCITT, “Recommendation X.509: The Directory – Authentication Framework,” 1988. [5]S. Deering, “ICMP Router Discovery Messages,” IETF RFC 1256, 1991. [6]W. Diffie and M. Hellman, “New Directions in Cryptography,” IEEE Transactions on Information Theory, Vol. 22, Issue 6, Nov. 1976, pp. 644-654. [7]W. Diffie and M. Hellman, “Privacy and Authentication: An Introduction to Cryptography,” Proceedings of the IEEE, Vol. 67, Issue 3, March 1979, pp. 397-427. [8]H. Dobbertin, A. Bosselaers, and B. Preneel, “RIPEMD-160: A Strengthened Version of RIPEMD,” Fast Software Encryption, LNCS 1039, Springer-Verlag, 1996, pp. 71-82. [9]D. Eastlake, S. Crocker and J. Schiller, “Randomness Requirements for Security,” IETF RFC 1750, 1994. [10]H. Fathi, R. Prasad, and S. Chakraborty, “Mobility Management for VoIP in 3G Systems: evaluation of low-latency handoff schemes,” IEEE Wireless Communications, Vol. 12, Issue 2, April 2005, pp. 96-104. [11]M. Handley, H. Schulzrinne, E. Schooler, and J. Rosenberg, “SIP: Session Initiation Protocol,” IETF RFC 2543, 1999. [12]M. Hellman, “An overview of public key cryptography,” IEEE Communications Magazine, Vol. 16, Issue 6, Nov. 1978, pp. 24-32. [13]R. Housley, W. Ford, W. Polk, and D. Solo, “Internet X. 509 Public Key Infrastructure Certificate and CRL Profile,” IETF RFC 2459, 1999. [14]ITU-T Recommendation H.225.0, “Call Signaling Protocols and Media Stream Packetization for Packet-based Multimedia Communication Systems,” 1996. [15]ITU-T Recommendation H.245, “Control Protocol for Multimedia Communication,” 1996. [16]ITU-T Recommendation H.261, “Video Codec for Audiovisual Services at p x 64 kbit/s,” 1993. [17]ITU-T Recommendation H.323, “Packet-Based Multimedia Communications Systems,” 1998. [18]ITU-T Recommendation Q.931, “ISDN User-network Interface Layer 3 Specification for Basic Call Control,” 1998. [19]S. Jacobs, “Mobile IP Public Key Based Authentication,” Internet draft, , 1998. [20]S. Jacobs and G. Cirincione, “Security of Current Mobile IP Solutions,” Proceedings of MILCOM’97, Vol. 3, 2-5 Nov. 1997, pp. 1122-1128. [21]J. K. Jan and Y. H. Chen, “A New Efficient MAKEP for Wireless Communications,” Proceedings of the 18th International Conference on Advanced Information Networking and Application, Vol. 2, 2004, pp. 347-350. [22]R. Juenuman, S. Matyas, and C. Meyer, “Message Authentication,” IEEE Communications Magazine, Vol. 23, Issue 9, Sept. 1985, pp. 29-40. [23]H. Krawczyk, M. Bellare, and R. Canetti, “HMAC: Keyed-Hashing for Message Authentication,” IETF RFC 2104, 1997. [24]C. C. Li, M. S. Hwang, and W. P. Yang, “A Flexible Remote User Authentication Scheme Using Smart Cards,” ACM SIGOPS Operating Systems Review, Vol. 36, Issue 3, July 2002, pp. 46-52. [25]C. W. Liao, “Movable Subnet Enhancement in Mobile IPv4 Environment,” Master thesis, Department of Electrical Engineering, Feng Chia University, 2002. [26]W. Liao, “Mobile Internet Telephony Protocol: An Application Layer Protocol for Mobile Internet Telephony Service,” Proceedings of the IEEE International Conference on Communications (ICC), Vol. 1, 6-10 June 1999, pp. 339-343. [27]M. H. Lin and C. C. Chang, “A Secure One-time Password Authentication Scheme with Low-Computation for Mobile Communications,” ACM SIGOPS Operating Systems Review, Vol. 38, Issue 2, April 2004, pp. 76-84. [28]K. E. Malki, “Low Latency Handoffs in Mobile IPv4,” Intetnet draft, , 2004. [29]G. A. Mills-Tettey and D. Kotz, “Mobile Voice over IP (MVOIP): An Application-level Protocol for Call Hand-off in Real Time Applications,” Proceedings of the 21st IEEE International Conference on Performance, Computing, and Communications, 3-5 April 2002, pp. 271-279. [30]M. Moh, G. Berquin, and Y. J. Chen, “Mobile IP Telephony: Mobility Support of SIP,” Proceedings of the 8th International Conference on Computer Communications and Networks, 11-13 Oct. 1999, pp. 554-559. [31]M. Mufti, and A. Khanum, “Design and Implementation of a Secure Mobile IP Protocol,” Proceedings of the International Conference on Networking and Communication (INCC), 11-13 June 2004, pp. 53-57. [32]National Institute of Standards and Technology, “Secure Hash Standard,” Federal Information Processing Standards Publication 180-1, April 1995. [33]S. Ohzahata, S. Kimura and Y. Ebihara,” A Fast Authentication Method for Secure and Seamless Handoff,” Proceedings of the 6th International Conference on Information Networking, Wireless Communications Technologies and Network Applications, LNCS 1039, Springer-Verlag, Jan.-Feb. 2002, pp. 243-252. [34]C. Perkins, “IP Mobility Support,” IETF RFC 2002, 1996. [35]C. Perkins, “IP Mobility Support version 2,” Internet draft, , 1997. [36]C. Perkins, “Mobile IP Support for IPv4,” IETF RFC 3344, 2002. [37]C. Perkins, “Mobile IP: Design Principles and Practices,” Addison-Wesley wireless communications series, 1998. [38]C. Perkins, “Mobile Networking through Mobile IP,” IEEE Internet Computing, Vol. 2, Issue 1, Jan.-Feb. 1998, pp. 58-69. [39]C. Perkins, “Mobile IP and security issue: an overview,” Proceedings of the 1st IEEE/Popov Workshop on Internet Technologies and Services, 1999, pp. 131-148. [40]C. Perkins and Kuang-Yeh Wang, “Optimized Smooth Handoffs in Mobile IP,” Proceedings of the 4th IEEE Symposium on Computers and Communications, 6-8 July 1999, pp. 340. [41]C. Perkins et al., “Route Optimization in Mobile IP,” IETF Internet Draft, , 2001. [42]R. Rivest, “The MD5 Message-Digest Algorithm,” IETF RFC 1321, 1992. [43]R. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public Key Cryptosystems,” Communications of the ACM, Vol. 21, Issue 2, Feb. 1978, pp. 120-126. [44]H. Schulzrinne and J. Rosenberg, “The Session Initiation Protocol: Internet-Centric Signaling,” IEEE Communications Magazine, Vol. 38, Issue 10, Oct. 2000, pp. 134-141. [45]G. Simmons, “Contemporary Cryptology: The Science of Information Integrity,” Piscataway, NJ: IEEE Press, 1992. [46]A. Sinkov, “Elementary Cryptanalysis: A Mathematical Approach.” Washington, DC: The Mathematical Association of America, 1966. [47]W. Stallings, “Cryptography and Network Security: Principles and Practices Third Edition,” Pearson Education Inc., 2003. [48]SlavaSoft QuickHash Library: http://www.slavasoft.com/quickhash/, visited 2006. [49]Sufatrio and K. Y. Lam, “Mobile IP Registration Protocol: A Security Attack and New Secure Minimal Public-Key Based Authentication,” Proceedings of the International Symposium on Parallel Architectures, Algorithms, and Networks, 23-25 June 1999, pp. 364-369. [50]X. Wang and H. Yu, “How to Break MD5 and Other Hash Functions,” Advances in Cryptology -- Eurocrypt''2005, LNCS, Springer-Verlag, 2005, pp. 19-35. [51]E. Wedlund and H. Schulzrinne, “Mobility Support Using SIP,” Proceedings of the 2nd ACM International Workshop on Wireless and Mobile Multimedia, 1999, pp. 76-82. [52]C. H. Wu, A. T. Cheng, S. T. Lee, J. M. Ho, and D T. Lee, “Bi-Directional Route Optimization in Mobile IP over Wireless LAN,” Proceedings of the 56th IEEE Vehicular Technology Conference, Vol. 2, 24-28 Sept. 2002, pp. 1168-1172. [53]J. Zao, J. Gahm, G. Troxel, M. Condell, P. Helinek, N. Yuan, I. Castineyra, and S. Kent, “A Public-key Based Secure Mobile IP,” Wireless Networks, Vol. 5, Issue 5, Oct. 1999, pp. 373-390. [54]J. Zhu and J. Ma, “A New Authentication Scheme with Anonymity for Wireless Environments,” IEEE Transactions on Consumer Electronics, Vol. 50, Issue 1, Feb. 2004, pp. 231-235.
|