Security and privacy criteria to evaluate authentication mechanisms in proxy mobile IPv6
Mobility management protocols support mobility for roaming mobile nodes in order to provide seamless connectivity. Proxy Mobile IPv6 is a network-based localized mobility management protocol that is more suitable for resource constrained devices among different mobility management schemes. In this p...
Saved in:
Main Authors: | Alizadeh, Mojtaba, Zamani, Mazdak, Baharun, Sabariah, Hassan, Wan Haslina, Khodadadi, Touraj |
---|---|
Format: | Article |
Published: |
Penerbit UTM Press
2015
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/55388/ http://dx.doi.org/10.11113/jt.v72.3935 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6
by: Alizadeh, Mojtaba, et al.
Published: (2015) -
Cryptanalysis and improvement of "a secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks"
by: Alizadeh, Mojtaba, et al.
Published: (2015) -
Mobile multicast in hierarchical proxy mobile IPV6
by: Mohd Aman, Azana Hafizah, et al.
Published: (2013) -
Mobility schemes in clustered proxy mobile IPv6
by: Al-Humrany, Adnan Jumaa Jabir
Published: (2015) -
Security analysis method of recognition-based graphical password
by: Khodadadi, Touraj, et al.
Published: (2015)