Patiyoot et al., “Techniques for Authentication Protocols and Key Distribution on Wireless ATM Networks”, Oct. 1998, ACM SIGOPS Operating Systems Review, vol. 32, Iss. 4, pp. 25-32.* |
Geng et al., “Defending Wireless Infrastructure Against the Challenge of DDoS Attacks”, Jan. 2002, Mobile Networks and Applications, vol. 7, Iss. 3, pp. 213-223.* |
Molva et al., “An authentication protocol for mobile users”, 1994, IEE, pp. 4/1-4/7.* |
Lin et al., “A Wireless-based Authentication and Anoymous Channels for Large Scale Area”, 2001, IEEE, pp. 36-41.* |
Lobo et al., “Fixed Network Call Setup Delay in a PCN Architecture with ATM Transport”, 1997, IEEE, pp. 1566-1571.* |
Prasad et al., “Security Architecture for Wireless LANs: Corporate & Public Environment”, 2000, IEEE, pp. 283-287.* |
R. Fielding, et al., Hypertext Transfer Protocol, Jan. 1997, Downloaded from http://src.doc.ic.ac.uk/computing/internet/rfc/rfc2068.txt., pp. 140. |
RFC 2068 Hypertext Transfer Protocol—HTTP/1.1., R. Fielding, et al., Jan. 1997, pp. 1-162 (162). |
Database UBET Online! Network working group. Request for comments 2068, Jan. 1, 1997. R. Fielding et al.: Hypertext Transfer Protocol HTTP/1.1 Retrieved from Internet: URL:HTTP://WWW.IETF.ORG/RFC/RFC2068.TXT XP002130469 p. 108. |