13 items found

Tags: Proxy Mobile IPv 6

Filter Results
  • dataset

    SPAM password change procedure.

    SPAM password change procedure.
  • dataset

    Notations used in this paper.

    Notations used in this paper.
  • dataset

    r37980778c78--17d915c835fac2fa8d9278e6c87e832d

    The password change procedure of the proposed method.
  • dataset

    r37980778c78--f1235f9bc1de6363aa806c88258ac6da

    Simulation environment.
  • dataset

    The Proposed authentication procedure between the MN and the MAG.

    The Proposed authentication procedure between the MN and the MAG.
  • dataset

    r37980778c78--c89e5191fafd2dc370bf6b8f976bd3c3

    BAN logic notations.
  • dataset

    The authentication procedure between the MAG and the LMA.

    The authentication procedure between the MAG and the LMA.
  • dataset

    Execution time for each operation and our scheme and other schemes.

    Execution time for each operation and our scheme and other schemes.
  • dataset

    Initial registration procedure of SPAM method.

    Initial registration procedure of SPAM method.
  • dataset

    Comparison between proposed scheme and other similar environment scheme.

    Comparison between proposed scheme and other similar environment scheme.
  • dataset

    Simulation parameters.

    MBR = MPW = MCV = 100, MCA = WBA. n ∈ {3, 9, 27}, WBA ∈ [0.1, 2], WPC ∈ [0, 20], WCT = 0.1. ⌈n/2⌉ groups of size 1 and ⌊n/2⌋ of size chosen uniformly at random from [1, ⌊n/2⌋]....
  • dataset

    The SPAM authentication procedure between the MN and the MAG.

    The SPAM authentication procedure between the MN and the MAG.
  • dataset

    r37980778c78--f1e01b5a1a6fa680557836d83bad0b91

    Notations used in SPAM scheme.