Identity-based Hierarchical Access Authentication in Mobile IPv6 Networks, 2006 IEEE International Conference on Communications, pp.1953-1958, 2006. ,
DOI : 10.1109/ICC.2006.255056
Security in Mobile IPv6: A survey, Information Security Technical Report, vol.12, issue.1, pp.32-43, 2007. ,
DOI : 10.1016/j.istr.2007.02.002
Conception du Protocole de S??curit?? Pour Mobile IPV6, annals of telecommunications - annales des t??l??communications, vol.29, issue.3???4, pp.61-64, 2006. ,
DOI : 10.1007/BF03219911
Mobile multi-layered IPsec, Wireless Networks, pp.1929-1939, 2005. ,
DOI : 10.1007/s11276-007-0031-z
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.141.7815
Optimized Method of Constructing IPSec SA between MN and HA in MobileIPv6, Journal of Information Engineering University, issue.2, pp.222-224, 2008. ,
Generic Packet Tunneling in IPv6 Specification, RFC 2473[J]. OverDRiVE 102 Description and Validation of Mobile Router and Dynamic IVAN Management, 1998. ,
Identity-Based Encryption from the Weil Pairing, Siam Journal on Computing, vol.32, issue.3, pp.213-229, 2001. ,
DOI : 10.1007/3-540-44647-8_13
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.21.3708
Efficient algorithms for pairing-based cryptosystems Advances in cryptologyCRYPTO, pp.354-369, 2002. ,
Flow Mobility Management in PMIPv6-based D- MM (Distributed Mobility Management) Networks, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), pp.120-127, 2014. ,
Rethinking IP Mobility Management, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), pp.41-49, 2012. ,
The Internet of Everything through IPv6: An Analysis of Challenges, Solutions and Opportunities, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), pp.97-118, 2013. ,