[1] Niafar,S,X Tan,D H K Tsang.The optimal user scheduling for LTE-A downlink with heterogeneous traffic types[A].International Conference on Heterogeneous Networking for Quality,Reliability,Security and Robustness[C].Rhodes Greece:IEEE,2014.56-62.
[2] Cisco.Global Mobile Data Traffic Forecast Update 2014-2019 White Paper,Feb 2015[J/OL].See:http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white-paper-c11-520862.html,2015.
[3] Forsberg D.LTE key management analysis with session keys context[J].Computer Communications,2010,33(16):1907-1915.
[4] Gudipati A,Perry D,Li L E.SoftRAN:Software defined radio access network[A].ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking[C].Hong Kong:ACM,2013.25-30.
[5] Bhaumik S,Chandrabose S P,Jataprolu M K.CloudIQ:a framework for processing base stations in a data center[A].Proceedings of the 18th Annual International Conference on Mobile Computing and Networking[C].Istanbul,Turkey:ACM,2012.125-136.
[6] Duan X,Wang X.Authentication handover and privacy protection in 5G hetnets using software-defined networking[J].IEEE Communications Magazine,2015,53(4):28-35.
[7] Song M,Choi J Y,Cho J D.Reduction of authentication cost based on key caching for inter-MME handover support[A].The 2014 International Conference on High Performance Computing & Simulation(HPCS 2014)[C].Bologna,Italy:IEEE,2014.885-892.
[8] A Bohk,L Buttyn,L Dra.An authentication scheme for fast handover between WiFi access points[A].Proceeding of ACM Wireless Internet Conference (WICON 2007)[C].Austin,USA:ACM,2007.22-24.
[9] Choi J,Jung S.A handover authentication using credentials based on chameleon hashing[J].IEEE Communications Letters,2010,14(1):54-56.
[10] Jing Q,Zhang Y,Fu A.A privacy preserving handover authentication scheme for EAP-based wireless networks[A].Global Telecommunications Conference (GLOBECOM 2011)[C].Houston,USA:IEEE,2011.1-6.
[11] Cao J,Li H,Ma M.A simple and robust handover authentication between HeNB and eNB in LTE networks[J].Computer Networks,2012,56(8):2119-2131.
[12] 3GPP TS 36.300 v10.4.0.Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN)[S].2011.
[13] 3GPP TS 36.401 v10.3.0.Evolved Universal Terrestrial Radio Access Network (E-UTRAN):Architecture description[S].2011.
[14] 3GPP TS 33.401 v10.5.0.3GPP System Architecture Evolution (SAE);Security architecture[S].2011.
[15] 3GPP TS 23.401 V10.5.0.General Packet Radio Service (GPRS) Enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN)[S].2011.
[16] Mambo M,Usuda K,Okamoto E.Proxy signatures:delegation of the power to sign messages[J].Ieice Transactions on Fundamentals of Electronics Communications & Computer Sciences,1996,79(9):1338-1354.
[17] Hwang M S,Tzeng S F,Tsai C S.Generalization of proxy signature based on elliptic curves[J].Computer Standards & Interfaces,2004,26(2):73-84.
[18] Jacobson,Michael Jr.Elliptic curves and cryptography[J].Dr Dobbs Journal,1997,19(3):173-193. |