

Author: McCann S.
Publisher: Springer Publishing Company
ISSN: 1022-0038
Source: Wireless Networks, Vol.10, Iss.1, 2004-01, pp. : 43-51
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


Authentications and Key Management in 3G-WLAN Interworking
By Li Xinghua
Mobile Networks and Applications, Vol. 16, Iss. 3, 2011-06 ,pp. :








Internetworking between HIPERLAN/2 and UMTS
By Chen K-C.
Wireless Personal Communications, Vol. 26, Iss. 2-3, 2003-01 ,pp. :