References
- IEEE Std. 802.16e-2005, 'Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems,' February 2006
- WiMax Forum Network Working Group Draft, 'WiMAX End-to-End Network Systems Architecture, Stage 3: Detailed Protocols and Procedures,' April 2006
- WiMax Forum Network Working Group Draft, 'WiMAX End-to-End Network Systems Architecture, Stage 2: Architecture Tenets, Reference Model and Reference Points ,' April 2005
- B. Aboba, L. Blunk, and J. Vollbrecht, 'Extensible Authentication Protocol (EAP),' IETF RFC 3748, June 2004
- B. Aboba, M. Beadles, J. Arkko and P.Eronen, 'The Network Access Identifier,' IETF RFC 4282, December 2005
- U. Meyer, J. Cordasco, and S. Wetzel, 'An Approach to Enhance Inter-Provider Roaming Through Secret Sharing and its Application to WLANs,' Proceedings of The ACM Workshop on Wireless Mobile Applications and Services on WLAN Hotspots(WMAHS'05), September 2005
- C. Rigney, S. Willens, A. Rubens, and W. Simpson, 'Remote Authentication Dial-In User Service (RADIUS),' IETF RFC 2865, June 2000
- Guonin Yang, D.S.Wong, X.Deng, 'Efficient Anonymous Roaming and Its Security Analysis', Proceedings of the 3rd International Conference on Applied Cryptography and Network Security(ACNS2005), LNCS 3531, Springer-Verlag, 2005
- L. Salgarelli, M. Buddhikot, J. Garay, S. Patel, and S. Miller, 'Efficient authentication and key distribution in Wireless IP networks,' IEEE Wireless Communications Magazine, 10(6), 2003
- A. Menezes, P. C. van Osrschot, and S. A. Vanstone, 'Handbook of Applied Cryptography', CRC Press, 1996