2008
DOI: 10.1109/mitp.2008.110
|View full text |Cite
|
Sign up to set email alerts
|

Responding to Security Issues in WiMAX Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
33
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 35 publications
(33 citation statements)
references
References 4 publications
0
33
0
Order By: Relevance
“…The SRA method improves the scalability for ELAPSE and it can also improve the other methods [20,21,23,24] which have similar setups. As mentioned earlier, ELAPSE divides the MSs into N subgroups.…”
Section: Selected Topics In Wimax 138mentioning
confidence: 98%
See 4 more Smart Citations
“…The SRA method improves the scalability for ELAPSE and it can also improve the other methods [20,21,23,24] which have similar setups. As mentioned earlier, ELAPSE divides the MSs into N subgroups.…”
Section: Selected Topics In Wimax 138mentioning
confidence: 98%
“…In [21], the authors proposed an algorithm called Efficient sub-Linear rekeying Algorithm with Perfect Secrecy (ELAPSE) in order to address the problems of MBRA algorithm. Although this method solves the forward and backward secrecy problems, it suffers from some weaknesses in terms of scalability and efficiency.…”
Section: Rekeying Algorithmsmentioning
confidence: 99%
See 3 more Smart Citations