Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
133 | Changhua He, Mukund Sundararajan, Anupam Datta, Ante Derek, John C. Mitchell |
A modular correctness proof of IEEE 802.11i and TLS. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
protocol composition logic, TLS, IEEE 802.11i |
130 | Aidil Izani Jafri, Yean Li Ho |
ANonce encryption in 802.11i 4-way handshake protocol. |
MoMM |
2009 |
DBLP DOI BibTeX RDF |
4-way handshake protocol, ANonce, 802.11i, DoS attack, WLAN security |
121 | Alexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis |
On RSN-Oriented Wireless Intrusion Detection. |
OTM Conferences (2) |
2007 |
DBLP DOI BibTeX RDF |
Robust Security Network, Intrusion Detection, 802.11i |
102 | Jörg Rech |
Wireless LANs - 802.11-WLAN-Technologie und praktische Umsetzung im Detail: 802.11a/h: 802.11b: 802.11g: 802.11i: 802.11n: 802.11d: 802.11e: 802.11f: 802.11s (3. Aufl.). |
|
2008 |
RDF |
|
101 | Hareesh Khattri, Rajendra S. Katti |
Implementation and performance analysis of IEEE 802.11i standard using the IXP425 network processor. |
PE-WASUN |
2005 |
DBLP DOI BibTeX RDF |
|
96 | Zeeshan Furqan, Shahabuddin Muhammad, Ratan K. Guha |
Formal Verification of 802.11i using Strand Space Formalism. |
ICN/ICONS/MCL |
2006 |
DBLP DOI BibTeX RDF |
|
94 | Duhyun Bae, Jiho Kim, Sehyun Park, Ohyoung Song |
Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
93 | Changhua He, John C. Mitchell |
Analysis of the 802.11i 4-way handshake. |
Workshop on Wireless Security |
2004 |
DBLP DOI BibTeX RDF |
4-way handshake, authentication, WLAN, key management, denial-of-service, 802.11i |
89 | Guido R. Hiertz, Sebastian Max, Rui Zhao, Dee Denteneer, Lars Berlemann |
Principles of IEEE 802.11s. |
ICCCN |
2007 |
DBLP DOI BibTeX RDF |
|
85 | Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole Bai, Dong Xuan |
Link-layer protection in 802.11i WLANS with dummy authentication. |
WISEC |
2009 |
DBLP DOI BibTeX RDF |
dummy authentication, security, wlan, open access |
81 | Purificación Sáiz, Jon Matías, Eduardo Jacob, Javier Bustamante, Armando Astarloa |
Adaptation of IEEE 802.1X for Secure Session Establishment Between Ethernet Peers. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
80 | You Sung Kang, KyungHee Oh, Byung-Ho Chung, Kyoil Chung, DaeHun Nyang |
Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism. |
ICOIN |
2004 |
DBLP DOI BibTeX RDF |
802.11i, 802.1X, WPA, WLAN security |
80 | Songhe Zhao, Charles A. Shoniregun, Chris Imafidon |
Addressing the vulnerability of the 4-way handshake of 802.11i. |
ICDIM |
2008 |
DBLP DOI BibTeX RDF |
|
80 | Elankayer Sithirasenan, Saad Zafar, Vallipuram Muthukkumarasamy |
Formal Verification of the IEEE 802.11i WLAN Security Protocol. |
ASWEC |
2006 |
DBLP DOI BibTeX RDF |
|
79 | Duhyun Bae, Gwanyeon Kim, Jiho Kim, Sehyun Park, Ohyoung Song |
Design and Implementation of Efficient Cipher Engine for IEEE 802.11i Compatible with IEEE 802.11n and IEEE 802.11e. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
74 | Mansoor Ahmed Khan, Ahmad Raza Cheema, Aamir Hasan 0001 |
Improved Nonce Construction Scheme for AES CCMP to Evade Initial Counter Prediction. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
AES CCMP, Initial Counter, Key Length, TMTO, Integrity, Encryption, Confidentiality, Nonce, IEEE 802.11i |
71 | Ju-A Lee, Jae-Hyun Kim, Jun-Hee Park, Kyung-Duk Moon |
A Secure Wireless LAN Access Technique for Home Network. |
VTC Spring |
2006 |
DBLP DOI BibTeX RDF |
|
67 | M. Razvi Doomun, K. M. S. Soyjaudah |
Adaptive IEEE 802.11i Security for Energy-Security Optimization. |
AICT |
2007 |
DBLP DOI BibTeX RDF |
energy-efficient, Wireless, adaptive security, IEEE 802.11i |
65 | Sangeetha L. Bangolae, Carol Bell, Emily Qi |
Performance study of fast BSS transition using IEEE 802.11r. |
IWCMC |
2006 |
DBLP DOI BibTeX RDF |
IEEE 802.11r standard, fast BSS transition, fast roaming, performance, wireless LAN |
59 | Shirantha Wijesekera, Xu Huang 0001, Dharmendra Sharma 0001 |
Multi-Agent Based Approach for Quantum Key Distribution in WiFi Networks. |
KES-AMSTA |
2009 |
DBLP DOI BibTeX RDF |
Quantum Key Distribution (QKD), MAS, WiFi, 802.11i |
58 | Rodolphe Marques, André Zúquete |
Fast, secure handovers in 802.11: back to the basis. |
Q2SWinet |
2008 |
DBLP DOI BibTeX RDF |
802.11 roaming, 802.1x authentication, fast reauthentication, fast handover |
58 | Aftab Ahmad, Mona El-Kadi, Stephan Olariu |
Common data security network (CDSN). |
Q2SWinet |
2005 |
DBLP DOI BibTeX RDF |
common data security, security plane, wireless LANs, security architecture, IEEE 802.11i, TKIP |
58 | Mohamed Kassab, Abdelfattah Belghith, Jean-Marie Bonnin, Sahbi Sassi |
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks. |
WMuNeP |
2005 |
DBLP DOI BibTeX RDF |
IAPP, pre-authentication, re-authentication, handover, WiFi, IEEE 802.11i |
55 | Gulsum Zeynep Gurkas Aydin, Abdül Halim Zaim, M. Ali Aydin |
Security Mechanisms And Their Performance Impacts On Wireless Local Area Networks. |
ISCN |
2006 |
DBLP DOI BibTeX RDF |
|
55 | Ulrike Meyer, Jared Cordasco, Susanne Wetzel |
An approach to enhance inter-provider roaming through secret sharing and its application to WLANs. |
WMASH |
2005 |
DBLP DOI BibTeX RDF |
EAP-TLS-KS, distributed DSS, inter-provider roaming, micropayment scheme, WLAN, secret sharing, PKI, 802.11i |
54 | Jianyong Huang, Jennifer Seberry, Willy Susilo, Martin W. Bunder |
Security Analysis of Michael: The IEEE 802.11i Message Integrity Code. |
EUC Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
54 | Fan Zhang, Jianfeng Ma 0001, Sang-Jae Moon |
The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11i. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Avishai Wool |
A note on the fragility of the "Michael" message integrity code. |
IEEE Trans. Wirel. Commun. |
2004 |
DBLP DOI BibTeX RDF |
|
41 | Georg Lukas, Christian Fackroth |
WMNSec: security for wireless mesh networks. |
IWCMC |
2009 |
DBLP DOI BibTeX RDF |
security, mobility, authentication, wireless mesh networks |
41 | Junbeom Hur, Chanil Park, Young-joo Shin, Hyunsoo Yoon |
An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks. |
ICOIN |
2007 |
DBLP DOI BibTeX RDF |
|
40 | David Q. Liu, Mark Coslow |
Extensible authentication protocols for IEEE standards 802.11 and 802.16. |
Mobility Conference |
2008 |
DBLP DOI BibTeX RDF |
extensible authentication protocol, wireless, IEEE 802.11, EAP |
35 | Sachin Garg, Martin Kappes, Mahalingam Mani |
Wireless access server for quality of service and location based access control in 802.11 networks. |
ISCC |
2002 |
DBLP DOI BibTeX RDF |
|
34 | Martin Eian |
Fragility of the Robust Security Network: 802.11 Denial of Service. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
802.11w, Security, Wireless, Denial of Service, 802.11, 802.11i |
34 | Christos Xenakis, Christoforos Ntantogian |
Security architectures for B3G mobile networks. |
Telecommun. Syst. |
2007 |
DBLP DOI BibTeX RDF |
B3G networks, EAP-SIM, EAP-AKA, WLAN, 3G, 802.11i, IKEv2 |
34 | Jon Allen, Jeff Wilson |
Securing a wireless network. |
SIGUCCS |
2002 |
DBLP DOI BibTeX RDF |
EAP-LEAP, EAP-MD5, EAP-TLS, EAP-TTLS, VPN, WEP, 802.11i, 802.1x |
34 | Yuteng Lu, Meng Sun 0002 |
Modeling and Verification of IEEE 802.11i Security Protocol in UPPAAL for Internet of Things. |
Int. J. Softw. Eng. Knowl. Eng. |
2018 |
DBLP DOI BibTeX RDF |
|
34 | Yuteng Lu, Meng Sun 0002 |
Modeling and Verification of IEEE 802.11i Security Protocol for Internet of Things. |
SEKE |
2018 |
DBLP DOI BibTeX RDF |
|
34 | Michael Gonzales, Paul Duncan, Kerssy Fermin, Roshad A. Guerrier, Abdelrahman Elleithy |
Enhancing IEEE 802.11i Standard using Quantum Cryptograp. |
UEMCON |
2018 |
DBLP DOI BibTeX RDF |
|
34 | Aymen Ghilen, Mostafa Azizi, Ridha Bouallegue |
Enhancing the Security of IEEE 802.11i Standard by Integrating a Quantum Scheme for Authentication and Encryption Key Distribution. |
Wirel. Pers. Commun. |
2017 |
DBLP DOI BibTeX RDF |
|
34 | Bahareh Shojaie, Iman Saberi, Mazleena Salleh |
Enhancing EAP-TLS authentication protocol for IEEE 802.11i. |
Wirel. Networks |
2017 |
DBLP DOI BibTeX RDF |
|
34 | R. Velayutham, D. Manimegalai |
CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE 802.11i): A Comparison with DES and RSA. |
J. Comput. Sci. |
2015 |
DBLP DOI BibTeX RDF |
|
34 | Rajeev Singh, Teek Parval Sharma |
On the IEEE 802.11i security: a denial-of-service perspective. |
Secur. Commun. Networks |
2015 |
DBLP DOI BibTeX RDF |
|
34 | Aymen Ghilen, Mostafa Azizi, Ridha Bouallegue |
Integration of a quantum protocol for mutual authentication and secret key distribution within 802.11i standard. |
AICCSA |
2015 |
DBLP DOI BibTeX RDF |
|
34 | Andres S. Troya, Jaime J. Astudillo, Carlos G. Romero, Fabian G. Saenz, Javier Díaz |
Vulnerability detection in 802.11i wireless networks through link layer analysis. |
LATINCOM |
2014 |
DBLP DOI BibTeX RDF |
|
34 | Abdullah A. Alabdulatif, Xiaoqi Ma, Lars Nolle |
Analysing and attacking the 4-way handshake of IEEE 802.11i standard. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
34 | Jaesung Park |
Secure handoff method for seamless service provisioning in infrastructure mode 802.11i system. |
ICOIN |
2013 |
DBLP DOI BibTeX RDF |
|
34 | Iman Saberi, Bahareh Shojaie, Mazleena Salleh, Mahan Niknafskermani, Mohammad Javad Rostami |
Preventing TMTO Attack in AES-CCMP in IEEE 802.11i. |
CN |
2012 |
DBLP DOI BibTeX RDF |
|
34 | Yang Li, Jun Han 0003, Shuai Wang, Junbao Liu, Xiaoyang Zeng |
A NoC-based multi-core architecture for IEEE 802.11i CCMP. |
ASICON |
2011 |
DBLP DOI BibTeX RDF |
|
34 | Ignacio Algredo-Badillo, Claudia Feregrino Uribe, René Cumplido, Miguel Morales-Sandoval |
Efficient hardware architecture for the AES-CCM protocol of the IEEE 802.11i standard. |
Comput. Electr. Eng. |
2010 |
DBLP DOI BibTeX RDF |
|
34 | Martin Eian |
A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP. |
CANS |
2010 |
DBLP DOI BibTeX RDF |
|
34 | Jing Liu 0003, Xinming Ye, Jun Zhang 0001, Jun Li 0002 |
Security Verification of 802.11i 4-Way Handshake Protocol. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Jung-Ho Lee, Sung-Rok Yoon, Kwang-Eui Pyun, Sin-Chong Park |
A Multi-Processor NoC platform applied on the 802.11i TKIP cryptosystem. |
ASP-DAC |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Xinyu Xing, Elhadi M. Shakshuki, Darcy G. Benoit, Tarek R. Sheltami |
Security Analysis and Authentication Improvement for IEEE 802.11i Specification. |
GLOBECOM |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Sung-Hyun Eum, Sung-Jae Cho, Hyoung-Kee Choi, Hyunseung Choo |
A Robust Session Key Distribution in 802.11i. |
ICCSA Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Arshad Aziz, Nassar Ikram |
An FPGA-based AES-CCM Crypto Core For IEEE 802.11i Architecture. |
Int. J. Netw. Secur. |
2007 |
DBLP BibTeX RDF |
|
34 | Hung-Yu Chien, Yuan-Liang Tang, Tzu-Hang Hsu |
Secure Fast Pre-authentication Based on IEEE 802.11i. |
IMECS |
2007 |
DBLP BibTeX RDF |
|
34 | Sunil K. Venugopal, Chirag Parikh, Parimal Patel |
Implementation of an IEEE 802.11i based Wireless Security System. |
HPCNCS |
2007 |
DBLP BibTeX RDF |
|
34 | Abdul Samiah, Arshad Aziz, Nassar Ikram |
An Efficient Software Implementation of AES-CCM for IEEE 802.11i Wireless St. |
COMPSAC (2) |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Alexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis |
Towards effective Wireless Intrusion Detection in IEEE 802.11i. |
SECPerU |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Floriano De Rango, Dionigi Cristian Lentini, Salvatore Marano |
Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i. |
EURASIP J. Wirel. Commun. Netw. |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Thi Mai Trang Nguyen, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie |
802.11i Encryption Key Distribution Using Quantum Cryptography. |
J. Networks |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Wei Han, Dong Zheng 0001, Kefei Chen |
Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
34 | Xiao Liu, Abraham O. Fapojuwo |
Formal Evaluation of Major Authentication Methods for IEEE 802.11i WLAN Standard. |
VTC Fall |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Stefan Lindskog, Anna Brunström, Zoltán Faigl, Katalin Toth |
Providing Tunable Security Services: An IEEE 802.11i Example. |
SecureComm |
2006 |
DBLP DOI BibTeX RDF |
|
34 | N. Manivannan, P. Neelameham |
Alternative Pair-wise Key Exchange Protocols (IEEE 802.11i) in Wireless LANs. |
ICWMC |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Jyh-Cheng Chen, Ming-Chia Jiang, Yi-Wen Liu |
Wireless LAN security and IEEE 802.11i. |
IEEE Wirel. Commun. |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Changhua He, John C. Mitchell |
Security Analysis and Improvements for IEEE 802.11i. |
NDSS |
2005 |
DBLP BibTeX RDF |
|
34 | Ho Yung Jang, Joon Hyoung Shim, Jung Hee Suk, In Cheol Hwang, Jun Rim Choi |
Compatible design of CCMP and OCB AES cipher using separated encryptor and decryptor for IEEE 802.11i. |
ISCAS (3) |
2004 |
DBLP BibTeX RDF |
|
33 | Andrew Gin, Ray Hunt |
Performance analysis of evolving wireless IEEE 802.11 security architectures. |
Mobility Conference |
2008 |
DBLP DOI BibTeX RDF |
IEEE 802.1x, TKIP (temporal key integrity protocol), WiFi protected access (WPA, WPA2), performance analysis, wireless LAN, PDA (personal digital assistant), IEEE 802.11i |
30 | Jaesung Park, Beomjoon Kim, Iksoon Hwang |
Secure and Seamless Handoff Scheme for a Wireless LAN System. |
OTM Workshops (1) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Ghazanfar Ali Safdar, Clare McGrath, Máire McLoone |
Limitations of existing wireless networks authentication and key management techniques for MANETs. |
ISCN |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Mohamed Kassab, Abdelfattah Belghith, Jean-Marie Bonnin, Sahbi Sassi |
Fast and secure handoffs for 802.11 Infrastructure Networks. |
Net-Con |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Duhyun Bae, Gwanyeon Kim, Jiho Kim, Sehyun Park, Ohyoung Song |
An Efficient Design of CCMP for Robust Security Network. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Xu Huang 0001, Dharmendra Sharma 0001 |
Multi-Agent Systems in Quantum Security for Modern Wireless Networks. |
KES (2) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Rafael Marín López, Ashutosh Dutta, Yoshihiro Ohba, Henning Schulzrinne, Antonio Fernandez Gómez-Skarmeta |
Network-Layer Assisted Mechanism to Optimize Authentication Delay during Handoff in 802.11 Networks. |
MobiQuitous |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Junbeom Hur, Chanil Park, Hyunsoo Yoon |
An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
proactive key distribution, pre-authentication, IEEE 802.11 network, vehicular network, fast handoff |
25 | Andrea G. Forte, Henning Schulzrinne |
Cooperation Between Stations in Wireless Networks. |
ICNP |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Elankayer Sithirasenan, Vallipuram Muthukkumarasamy |
Detecting Security Threats in Wireless LANs Using Timing and Behavioral Anomalies. |
ICON |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Hassnaa Moustafa, Gilles Bourdon, Yvon Gourhant |
Providing Authentication and Access Control in Vehicular Network Environment. |
SEC |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Thi Mai Trang Nguyen, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie |
Integration of Quantum Cryptography in 802.11 Networks. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Rupinder Gill, Jason Smith 0001, Andrew J. Clark |
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks. |
ACSW |
2006 |
DBLP BibTeX RDF |
session hi-jacking, wireless intrusion detection, round trip time, received signal strength, passive monitoring |
25 | Daniel B. Faria, David R. Cheriton |
Detecting identity-based attacks in wireless networks using signalprints. |
Workshop on Wireless Security |
2006 |
DBLP DOI BibTeX RDF |
IEEE 802.11., security, wireless LANs, location-based services, denial-of-service attacks |
25 | Rainer Huber, Norbert Jordan |
An Experimental Study of a Business Domain Independent Application Level and Internet Access Authentication and Authorization Concept. |
ICMB |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Finn Michael Halvorsen, Olav Haugen, Martin Eian, Stig Fr. Mjølsnes |
An Improved Attack on TKIP. |
NordSec |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Fabio Martignon, Stefano Paris, Antonio Capone |
MobiSEC: a novel security architecture for wireless mesh networks. |
Q2SWinet |
2008 |
DBLP DOI BibTeX RDF |
experimental test-bed, security, authentication, wireless mesh networks |
21 | Duncan A. Grove, Toby C. Murray, Chris A. Owen, Chris J. North, J. A. Jones, Mark R. Beaumont, Bradley D. Hopkins |
An Overview of the Annex System. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Jin-Cherng Lin, Yu-Hsin Kao, Chen-Wei Yang |
Secure Enhanced Wireless Transfer Protocol. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
IEEE 802.11 Family, SEWTP, WLAN, WEP, TKIP |
21 | René Neumerkel, Stephan Groß |
A Sophisticated Solution for Revealing Attacks on Wireless LAN. |
TrustBus |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Panu Hämäläinen, Jari Heikkinen, Marko Hännikäinen, Timo D. Hämäläinen |
Design of Transport Triggered Architecture Processors for Wireless Encryption. |
DSD |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Hassnaa Moustafa, Gilles Bourdon, Yvon Gourhant |
AAA in vehicular communication on highways with ad hoc networking support: a proposed architecture. |
Vehicular Ad Hoc Networks |
2005 |
DBLP DOI BibTeX RDF |
inter-vehicular routing, security, ad hoc networks, AAA, vehicular communications |
21 | Fan Zhang, Jianfeng Ma 0001 |
Security Analysis on Chinese Wireless LAN Standard and Its Solution. |
ICPP Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Emmanuel López-Trejo, Francisco Rodríguez-Henríquez, Arturo Díaz-Pérez |
An FPGA Implementation of CCM Mode Using AES. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Thilo Pionteck, Thorsten Staake, Thomas Stiefmeier, Lukusa D. Kabulepa, Manfred Glesner |
On the design of a function-specific reconfigurable: hardware accelerator for the MAC-layer in WLANs. |
FPGA |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Jiejun Kong, Shirshanka Das, Edward Tsai, Mario Gerla |
ESCORT: a decentralized and localized access control system for mobile wireless access to secured domains. |
Workshop on Wireless Security |
2003 |
DBLP DOI BibTeX RDF |
decentralized access control, identity privacy, mobile privacy, location privacy, wireless security |