|
1.D. Johnson, C. Perkins, J. Arkko, “Mobility Support in IPv6,” Request for comments 3775, IETF, June 2004 2.Feng Yong, Wu Zhongfu, Zhong Jiang, Ye Chunxiao, Wu Kaigui, “A Novel Authentication Mechanism Based on CGA for BU Message Disposal in Mobile IPv6,” International Conference on Networking, Architecture, and Storage 3.Fu-Chen Yang, Yen-Cheng Chen, “A stateless Return Routability Scheme in Mobile IPv6,” International Conference on E-Business and Information System Security 2009, IEEE, Wuhan, China. 4.Yen-Cheng Chen, Fu-Chen Yang, “An Efficient MIPv6 Return Routability Scheme Based on Geometric Computations,” Inter. Conf. on Computer Network and System Security, Proceedings of WASET, Vol. 39, 2009, HK 5.M. Roe, T. Aura, G.O’Shea, J. Arkko, “Authentication of Mobile IPv6 Binding Updates and Acknowledgements”, IETF internet draft, February 2002 6.Tuomas Aura, Michael Roe, “Designing the Mobile IPv6 Security Protocol,” Technical Report, April 2006. 7.T. Aura, “Cryptographically generated addresses (CGA),” Request for Comments 3972, IETF, 2005. 8.Kui Ren, Wenjing Jou, Kai Zeng, Feng Bao, Jianying Zhou, Robert H. Deng, “Routing optimization security in mobile IPv6,” Computer Network, 2006, pp: 2401-2419 9.Khaled Elgoarany, Mohamed Eltoweissy, “Security in Mobile IPv6: A survey,” Information Security Technical Report, ELSEVIER, March 2007. 10.Ruidong Li, Jie Li, Kui Wu, Yang Xiao, Jiang Xie, “An Enhanced Fast handover with Low Latency for Mobile IPv6,” IEEE Transaction on Wireless Communications, Vol. 7, No. 1, Jan 2008 11.Warodom Werapun, Apinetr Unakul, “Secure Mobile IPv6 Binding Updates with Identiy-based Signature,” international conference on Electronics Packaging, Jan 2004 12.Jung-Doo Koo, Dong-Chun Lee, “Extended Ticket-based Binding Update(ETBU) Protocol for Mobile IPv6(MIPv6) Networks,” IEICE TRANS. COMMUN., VOL.E90-B, NO. 4, APRIL 2007 13.Tzong-Chen Wu, “Remote login authentication scheme based on a geometric approach,” Computer Communications, Vol 18, No. 12. december 1995 14.Hung-Yu Chien, Jinn-Ke Jan, Yuh-Min Tseng, “A modified remote login authentication scheme based on geometric approach” The journal of Systems and Software 55, 2001 (287-290) 15.Benoit Libert, J.J. Quisquater, “A new identity based signcryption scheme from pairings”, Proceeding of the IEEE information Theory Workshop, ITW2003, Paris, France, March 31-Apri 4, 2003 16.Liqun Chen, Keith Harrison, “Multiple Trusted Authorities in Identifier Based Cryptography from Pairings on Elliptic Curves”, HP laboratories Bristol, March 19, 2003 17.Liqun Chen, Keith Harrison, David Soldera, Nigel Smart, “Application of Multiple Trusted Authorities in Pairing Based Cryptosystems”, HP Laboratories Bristol, Feb. 6, 2003 18.Yong Yu, Bo Yang, Ying Sun, Sheng-Lin Zhu, “Identity based signcryption scheme without random oracles,” Computer Standards & Interface 31 (2009) 56-62 19.Boneh, M. Franklin, “Identity-Based Encryption from the Weil Pairing,” Proceedings of Crypto 2001, volume 2139 of Lecture Notes in Computer Science, pages 213-229, Springer-Verlag, 2001. 20.Z. Jin, H. Zuo, H. Du, Q. Wen, “ An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs,” International Conference on Computer Science and Information Technology 2008. 21.J.C. Cha and J.H. Chen, “An identity-based signature from gap Diffie-Hellman groups,” Proceeding of Practice and Theory in Public key Cryptography-PKC 2003, LNCS 2567, pp:18-30. 22.Antom Larsson, “Authentication, Authorization and Accounting within an Access Network using Mobile IPv6 and Diameter”, Master thesis, Department of Computer Science and Electrical Engineering in Lulea University of Technology, 2003 23.Mobile IP and WLAN with AAA authentication Protocol using Identity-based Crytography” 10th International Conference on Telecommunications, Volume 1, 23 Feb.-1 March 2003 Page(s):597 – 603 24.R.C. Wang, R.Y. Chen, and Han-Chieh Chao, “AAA architecture for Mobile IPv6 based on WLAN,” International Journal of Network Management, 2004, 14:305-313 25.A. Georgiades, Y. Luo and A. Lasebae, R. Comley "Binding Update Security for Mobile Ipv6 using the Distributed Authentication Protocol". WSEAS Transactions on Communications, Issue 9, volume 4, September 2005, ISSN 1109-2742. 26.Jun Jiang, Chen He, Ling-ge, Jiang, “A novel mix-based location privacy mechanism in Mobile IPv6,” Computer & Security (2005) 24, 629-641 27.Hanane Fathi, Shyam S. Chakraborty, Ramjee Prasad, “Optimization of Mobile IPv6-based Handovers to Support VoIP Service in Wireless Heterogeneous Networks,” IEEE transaction on vehicular technology, vol. 56, No.1, Jan. 2007 28.Ruidong Li, Jie Li, Kui Wu, Yang Xiao, Jiang Xie, “An Enhanced Fast Handover with Low Latency for Mobile IPv6,” IEEE transaction on vehicular technology, vol. 7, No.1, Jan. 2008 29.Yen-Wen Chen, Chih-Min Shih, “Binding Update Scheme of Mobile Networks in IPv6 environment,” Journal of Internet Technology, vol. 8, No.3 , pp:291-298, 2007 30.H.S. Yoon, R.H. Kim, S.B. Hong, H.Y. Youm, “PAK-based Binding Update Method for Mobile IPv6 route optimization,” International Conference on Hybrid Information Technology 2006 (ICHIT’06) 31.Jiann-Liang Chen, Yu-Feng Lee, and Yao-Chung Chang, “Mobile IPv6 Network: implementation and application,” International Journal of Network Management 2006;16: 29-43 32.J. Baek, J. Newmarch, R. Safavi-Naini, and W. Susilo, “A Survey of Identity-Based Crptography,” Proc. of the 10th Annual Conference for Australian Unix User¡¯s Group (AUUG 2004), pp. 95-102, 2004. 33.B. Lynn, “Authenticated Identity-Based Encryption,” Cryptology ePrint Archive, Report 2002 34.Martin Cagne, “Identity-Based Encryption: a Survey,” RSA Laboratories Cryptobytes, Volume 6,No. 1, 2003 35.ISO/IEC 14888-3 information techonology – Security technology – Digital signatures with appendix – Part 3: Discret logarithm based mechanisms. 36.J.C. Cha and J.H. Cheon, “An identity-based signature from gap Diffie-Hellman groups,” Proceeding of Practice and Theory in Public Key Cryptography – PKC 2003, LNCS 2567, pp. 18-30
|