Aziz, A. et al, “Privacy and Authentication for Wireless Local Area Networks: A Secure Communications Protocol to Prevent Unauthorized Access”, IEEE Personal Communications, IEEE Communications Society, US, vol. 1, No. 1, 1994, pp. 25-31, XP000460718, ISSN: 1070-9916. |
Bharghavan, V., “Secure Wireless LANs”, 2nd ACM Conference on Computer and Communications Security, Nov. 2, 1994, pp. 10-17, XP002155490. |
Hung-Yu, Lin et al., “Authentication in Wireless Communications”, Global Telecommunications Conference, 1993, including a Communications Theory Mini-Conference. Technical Program Conference Record, IEEE in Houston. |
GlobeCom '93., IEEE Houston, TX, USA, Nov. 29-Dec. 2 1993, New York, NY, USA, IEEE, Nov. 29, 1993, pp. 550-554, XP010109722, ISBN: 0-7803-0917-0. |
Haartsen, J., “Bluetooth: Vision, Goals, and Architecture”, Mobile Computing and .Communications Review, ACM, New York, NY, US, vol. 2, No. 4, Oct. 1, 1998, pp. 38-45, XP000784002. |
Snoeren et al, “And End-to-End Approach to Host Mobility”, 6th ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom '00), Aug. 2000, Boston, MA. |
“3Com Introduces Industry's First Layer 3 Wireless LAN Security Solution”, published at http://www.3com.com/news/releases/pr00/jul0500a.html, Jul. 5, 2000, Santa Clara, CA. |
P. Srisuresh, et al. “IP Network Address Translator (NAT) Terminology and Considerations”, XP-002204216, Request for Comments 2663, published by The Internet Society, Aug. 1999. |
“Design and analysis of replicated servers to support IP-host mobility in enterprise networks”, Communications, 1997. ICC '97 Montreal, QUE., Canada 8-12 Jun. 1997, New York, NY, USA, IEEE, US, Jun. 8, 1997, pp. 1256-1260, XP010226957 ISBN: 0-7803-3925-8. |