[1] Yarali A and Rahman S. WiMAX broadband wireless access technology: Services, architecture and deployment models [C]. Electrical and Computer Engineering, 2008. CCECE 2008, Canada, 2008: 77-82. [2] [2] IEEE 802.16e-2005. Air interface for fixed broadband wireless access systems, Amendment 2: Physical and medium access control layers for combined fixed and mobile operation in licensed bands[S], NJ, USA, IEEE Press, 2006. Kim Dongmyoung, Cai Hua, and Na Minsoo, et al.. Performance measurement over Mobile WiMAX/IEEE 802.16e network[C], 2008 IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks, Newport Beach, CA, United states, 2008: 1-8. Agrawal Dharma P, Gossain Hrishikesh, and Cavalcanti Dave, et al.. Recent advances and evolution of WLAN and WMAN standards[C]. IEEE Wireless Communications, USA, 2008: 54-55. [3] Johnston D and Walker J. Mutual authentication for PKMv2, IEEE C802.16e-04_229rl. 2004. [4] Liu Fu-qiang and Lu Lei. A WPKI-Based security mechanism for IEEE 802.16e[C]. WiCOM International Conference, Wuhan, 2006: 1-4. [5] Sun Hung-min, Lin Yue-hsun, and Chen Shuai-min, et al.. Secure and fast handover scheme based on pre-authentication method for 802.16/WiMAX infrastructure networks[C]. 2007 IEEE Region 10 Conference, Taipei, 2007: 1-4. [6] Shon Taeshik and Choi Wook. An analysis of mobile WiMAX security: vulnerabilities and solutions [J].Lecture Notes in Computer Science.2007, 4658:88-97 [7] Xu Sen and Huang Chin-tser. Attacks on PKM protocols of IEEE 802.16 and its later versions[C]. Proceedings of 3rd International Symposium on Wireless Communication System (ISWCS 2006), Valencia, 2006: 185-189. [8] Datta A. Security analysis of network protocols: compositional reasoning and complexity-theoretic Foundations[D]. [Ph.D. dissertation], Computer Science Department, Stanford University, 2005. [9] Datta A, Derek A, and Mitchell J C, et al.. Protocol Composition Logic (PCL)[J].Electronic Notes in Theoretical Computer Science.2007, 172:311-358 [10] Cremers C. On the protocol composition logic PCL[C]. Proceedings of the 2008 ACM symposium on Information, computer and communications security, Tokyo, Japan, 2008: 66-76. Doug K, Ryan M, and Tony B, et al.. A correctness proof of a mesh security architecture[C]. Proceedings of the 2008 21st IEEE Computer Security Foundations Symposium, 2008: 315-330. [11] Johnston D and Walker J. Overview of IEEE 80216 security[J].. IEEE Security Privacy.2004, 2:40-48 [12] He Chang-hua, Sundararajan M, and Datta A, et al.. A modular correctness proof of IEEE 802.11i and TLS[C], Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS'05), Alexandria, VA, USA, 2005: 2-15. [13] 铁满霞, 李建东, 王育民. WAPI密钥管理协议的PCL证明[J].电子与信息学报.2009, 31(2):444-447浏览 Tie Man-xia, Li Jian-dong, and Wang Yu-min. A correctness proof of WAPI key management protocol based on PCL[J].Journal of Electronics Information Technology.2009, 31(2):444-447 [14] Meadows C and Pavlovic D. Deriving, attacking and defending the GDOI protocol[C]. Proceedings of 9th European Symposium On Research in Computer Security, France, 2004: 53-72. [15] Lowe G. Some new attacks upon security protocols[C]. Computer Security Foundations Workshop, 1996, Proceedings, 9th IEEE, Kenmare, Ireland, 1996: 10-12.
|