{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T04:15:41Z","timestamp":1746159341403,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_38","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T14:26:22Z","timestamp":1391783182000},"page":"428-439","source":"Crossref","is-referenced-by-count":0,"title":["Seamless Handoff of Ping-Pong Calls in Mobile Wimax Networks"],"prefix":"10.1007","author":[{"given":"Balu","family":"Sridevi","sequence":"first","affiliation":[]},{"given":"G. V. Shirley","family":"Julia","sequence":"additional","affiliation":[]},{"given":"S.","family":"Rajaram","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"38_CR1","unstructured":"Andrews, J.G., Ghosh, A., Mohammed, R.: Fundamentals of WiMAX: Understanding Broadband Wireless Networking. Prentice Hall (2007)"},{"key":"38_CR2","doi-asserted-by":"crossref","unstructured":"Tang, S.-Y., Muller, P., Sharif, H.R.: Wimax security and quality of service. John Wiley & Sons Ltd. (2010)","DOI":"10.1002\/9780470665749"},{"key":"38_CR3","doi-asserted-by":"crossref","unstructured":"Sridevi, B., Rajaram, S.: GUI based cost effective handoff management in the WiMAX Network entry process using key caching mechanism. In: SEISCON 2011. IEEE Explore (February 2012)","DOI":"10.1049\/cp.2011.0497"},{"key":"38_CR4","doi-asserted-by":"crossref","unstructured":"Hsu, S.F., Lin, Y.B.: A key caching mechanism for reducing WiMAX authentication cost in Handoff. IEEE Trans. Veh. Tech.\u00a058(8) (October 2009)","DOI":"10.1109\/TVT.2009.2022079"},{"key":"38_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1007\/978-3-540-24693-0_40","volume-title":"NETWORKING 2004. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications","author":"A. Markopoulos","year":"2004","unstructured":"Markopoulos, A., Pissaris, P., Kyriazakos, S., Sykas, E.D.: Efficient location-based hard handoff algorithms for cellular systems. In: Mitrou, N.M., Kontovasilis, K., Rouskas, G.N., Iliadis, I., Merakos, L. (eds.) NETWORKING 2004. LNCS, vol.\u00a03042, pp. 476\u2013489. Springer, Heidelberg (2004)"},{"key":"38_CR6","doi-asserted-by":"crossref","unstructured":"Feher, Z., Veres, A.: Ping-Pong Reduction Using Sub Cell Movement Detection. In: IEEE 75th Vehicular Technology Conference (VTC Spring), pp. 1\u20135 (2012)","DOI":"10.1109\/VETECS.2012.6239926"},{"key":"38_CR7","unstructured":"Kang, H., et al.: Ping-pong Call Resuming Procedure during HO, IEEE 802.16Broadband Wireless Access Working Group Project, IEEE 802.16e\/03-26r (2004)"},{"key":"38_CR8","unstructured":"Sridevi, B., Rajaram, S.: Compressed Key Exchange and Key Caching in PKMv2-EAP Mobile WiMAX Authentication. European Journal of Scientific and Research (March 2012)"},{"key":"38_CR9","doi-asserted-by":"crossref","unstructured":"Sridevi, B., Rajaram, S.: Dynamic Inter Arrival Time Based Seamless Handoff for Mobile WiMAX Ping-Pong Calls Bypassing PKMv2 EAP Authentication. International Journal of Computer Network and Information Security, 56\u201364 (June 2012)","DOI":"10.5815\/ijcnis.2012.06.08"},{"key":"38_CR10","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1109\/SURV.2010.032210.00064","volume":"12","author":"S.K. Ray","year":"2010","unstructured":"Ray, S.K., Pawlikowski, K., Sirisena, H.: Handover in Mobile WiMAX Networks: The State of Art and Research Issues. IEEE Communications Surveys & Tutorials\u00a012, 376\u2013398 (2010)","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"38_CR11","doi-asserted-by":"crossref","unstructured":"Wang, S.S., Wu, C.-H.: Effective handoff method using mobile location information. In: Proceedings of the Fifty Third IEEE Conference on Vehicular Technology, pp. 2585\u20132589 (2001)","DOI":"10.1109\/VETECS.2001.944068"},{"issue":"16","key":"38_CR12","doi-asserted-by":"publisher","first-page":"3759","DOI":"10.1016\/j.comnet.2011.03.020","volume":"55","author":"Z. Becvar","year":"2011","unstructured":"Becvar, Z., Mach, P., Simak, B.: Improvement of handover prediction in mobile WiMAX by using two thresholds. Journal of Computer Networks\u00a055(16), 3759\u20133773 (2011)","journal-title":"Journal of Computer Networks"},{"key":"38_CR13","doi-asserted-by":"crossref","unstructured":"Tseng, P.H., Feng, K.T.: \u2018A Predictive Movement Based Handover Algorithm for Broadband Wireless Networks\u2019. In: Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Las Vegas, USA, pp. 2834\u20132839 (2008)","DOI":"10.1109\/WCNC.2008.496"},{"key":"38_CR14","unstructured":"Kang, H., Koo, C., Son, J., Lim, H.: Resource Remain type for Drop or Ping Pong Call Recovery, IEEE 802.16Broadband Wireless Access Working Group Project, IEEE 802.16e\/03-26r1 (March 5, 2004a), http:\/\/www.ieee802.org\/16\/tge\/contrib\/C80216e-0426r1.pdf"},{"key":"38_CR15","unstructured":"Sridevi, B., Rajaram, S.: Automated secured handoff delay reduction by minimizing authentication cost in mobile WiMAX network entry process. International Journal of Innovation and Technology Management; (ISSN: 1741-5179 , Impact factor 0.727 - As indicated in Annexure I of refereed journal list given in Anna University Portal)"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T20:17:48Z","timestamp":1746130668000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_38","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}