|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 57 occurrences of 39 keywords
|
|
|
Results
Found 72 publication records. Showing 72 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
52 | Rodolphe Marques, André Zúquete |
Fast, secure handovers in 802.11: back to the basis. |
Q2SWinet |
2008 |
DBLP DOI BibTeX RDF |
802.11 roaming, 802.1x authentication, fast reauthentication, fast handover |
42 | Steven K. Brawn, R. Mark Koan, Kelly Caye |
Staying secure in an insecure world: 802.1x secure wireless computer connectivity for students, faculty, and staff to the campus network. |
SIGUCCS |
2004 |
DBLP DOI BibTeX RDF |
PEAP, dynamic WEP, wireless network, authentication, VPN, 802.1x |
41 | Purificación Sáiz, Jon Matías, Eduardo Jacob, Javier Bustamante, Armando Astarloa |
Adaptation of IEEE 802.1X for Secure Session Establishment Between Ethernet Peers. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Seong-Pyo Hong, Jong-An Park, Seung Jo Han, Jae-Young Pyun, Joon Lee |
Design of WLAN Secure System Against Weaknesses of the IEEE 802.1x. |
ICHIT |
2006 |
DBLP DOI BibTeX RDF |
IEEE 802.1x, Privacy, Authentication, Wireless LAN Security |
25 | You Sung Kang, KyungHee Oh, Byung-Ho Chung, Kyoil Chung, DaeHun Nyang |
Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism. |
ICOIN |
2004 |
DBLP DOI BibTeX RDF |
802.11i, 802.1X, WPA, WLAN security |
24 | Ju-A Lee, Jae-Hyun Kim, Jun-Hee Park, Kyung-Duk Moon |
A Secure Wireless LAN Access Technique for Home Network. |
VTC Spring |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Neal Leavitt |
Will IEEE 802.1X Finally Take Off in 2008? |
Computer |
2008 |
DBLP DOI BibTeX RDF |
security, wireless networks, 802.1X |
22 | Ya-Chin Sang, Yi-Bing Lin |
Effects of the EAPOL Timers in IEEE 802.1X Authentication. |
IEEE Trans. Wirel. Commun. |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Changhua He, Mukund Sundararajan, Anupam Datta, Ante Derek, John C. Mitchell |
A modular correctness proof of IEEE 802.11i and TLS. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
protocol composition logic, TLS, IEEE 802.11i |
15 | Jon Allen, Jeff Wilson |
Securing a wireless network. |
SIGUCCS |
2002 |
DBLP DOI BibTeX RDF |
EAP-LEAP, EAP-MD5, EAP-TLS, EAP-TTLS, VPN, WEP, 802.11i, 802.1x |
15 | Rodolphe Marques, Edgar Araújo, André Zúquete |
Fast 802.11 handovers with 802.1X reauthentications. |
Secur. Commun. Networks |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Hareesh Khattri, Salvador Mandujano |
On the Security of 802.11 and 802.1X: Evaluating an Embedded Network Stack. |
Security and Management |
2007 |
DBLP BibTeX RDF |
|
14 | Xu Huang 0001, Shirantha Wijesekera, Dharmendra Sharma 0001 |
Novel Protocol and Its Implementation QKD in Wi-Fi Networks. |
ACIS-ICIS |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Songhe Zhao, Charles A. Shoniregun, Chris Imafidon |
Addressing the vulnerability of the 4-way handshake of 802.11i. |
ICDIM |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Elankayer Sithirasenan, Saad Zafar, Vallipuram Muthukkumarasamy |
Formal Verification of the IEEE 802.11i WLAN Security Protocol. |
ASWEC |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Jaesung Park, Beomjoon Kim, Iksoon Hwang |
Secure and Seamless Handoff Scheme for a Wireless LAN System. |
OTM Workshops (1) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Debabrata Nayak, Deepak B. Phatak, Ved Prakash Gulati |
Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Chia Hsing Tung, Yi Quan Chen, Zhi Mou Chen, Shuoh-Ren Tsai |
Implementation of Security Mechanism for Adhoc Wireless Networks Based on X.509 and IEEE 802.1X. |
SUTC (1) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Arun Saha, Mart L. Molle |
Thinking Outside the Box: Extending 802.1x Authentication to Remote "Splitter" Ports by Combining Physical and Data Link Layer Techniques. |
LCN |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Iván Vidal, Francisco Valera, Jaime García-Reinoso, Arturo Azcorra, Vitor Pinto, Vítor Ribeiro |
QoS and Authentication Experiences in a Residential Environment Within a Broadband Access Framework. |
WWIC |
2007 |
DBLP DOI BibTeX RDF |
RGW, triple play, trials, QoS, broadband, 802.1X |
10 | Georgios Kambourakis, Stefanos Gritzalis |
On Device Authentication in Wireless Networks: Present Issues and Future Challenges. |
TrustBus |
2007 |
DBLP DOI BibTeX RDF |
Device authentication, Wireless security, 802.1X, TCG |
10 | Douglas E. Ennis |
The wireless tightrope: an economical, secure, and user friendly approach for the wireless campus. |
SIGUCCS |
2005 |
DBLP DOI BibTeX RDF |
EAP-TLS, MSCHAPv2, PEAP, SSL certificates, SWAN, WLCCP, WEP, 802.1X |
9 | Ding Tang, Cheng Wan 0004, Zhijun Zhao |
A New Design of AAA Client for Integrated Access Based on Embedded Linux. |
CSSE (2) |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Hyung-Woo Lee |
Secure Authentication and Accounting Mechanism on WLAN with Interaction of Mobile Message Service. |
HCI (6) |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Elankayer Sithirasenan, Vallipuram Muthukkumarasamy |
Detecting Security Threats in Wireless LANs Using Timing and Behavioral Anomalies. |
ICON |
2007 |
DBLP DOI BibTeX RDF |
|
9 | André Zúquete, Hugo Marques |
A Security Architecture for Protecting LAN Interactions. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Fernando C. Colón Osorio, Emmanuel Agu, Kerry McKay |
Measuring energy-security tradeoffs in wireless networks. |
IPCCC |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Aftab Ahmad, Mona El-Kadi, Stephan Olariu |
Common data security network (CDSN). |
Q2SWinet |
2005 |
DBLP DOI BibTeX RDF |
common data security, security plane, wireless LANs, security architecture, IEEE 802.11i, TKIP |
9 | Rainer Huber, Norbert Jordan |
An Experimental Study of a Business Domain Independent Application Level and Internet Access Authentication and Authorization Concept. |
ICMB |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Mohamed Ali Kâafar, Lamia Ben Azzouz, Farouk Kamoun, Davor Males |
A Kerberos-Based Authentication Architecture for Wireless LANs. |
NETWORKING |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Joseph W. Graham II |
Authenticating public access networking. |
SIGUCCS |
2002 |
DBLP DOI BibTeX RDF |
NDS, PPPoE, authentication, networking, wireless, LDAP, Kerberos, directory, DHCP, active directory |
9 | Daniel B. Faria, David R. Cheriton |
DoS and authentication in wireless public access networks. |
Workshop on Wireless Security |
2002 |
DBLP DOI BibTeX RDF |
security, wireless networks, DoS |
9 | David Geer |
Whatever Happened to Network-Access-Control Technology? |
Computer |
2010 |
DBLP DOI BibTeX RDF |
NAC, IEEE 802.1X, NAC frameworks, policy decision points, NAC interoperability, RADIUS, network access control |
9 | Andrew Gin, Ray Hunt |
Performance analysis of evolving wireless IEEE 802.11 security architectures. |
Mobility Conference |
2008 |
DBLP DOI BibTeX RDF |
IEEE 802.1x, TKIP (temporal key integrity protocol), WiFi protected access (WPA, WPA2), performance analysis, wireless LAN, PDA (personal digital assistant), IEEE 802.11i |
8 | Frederik Hauser, Marco Häberle, Michael Menth |
P4sec: Automated Deployment of 802.1X, IPsec, and MACsec Network Protection in P4-Based SDN. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
8 | Igor Virgílio Araújo, Solange Rito Lima, André Domingos Brízido |
IEEE 802.1X Virtual Network Function Development for NG-PON Architecture. |
SoftCOM |
2022 |
DBLP BibTeX RDF |
|
8 | Maxim Kovtsur, Andrey Minyaev, Dmitrii Khramtsov, Georgii Abramenko |
Investigation of Attacks and Methods of Protection of Wireless Networks During Authorization Using the IEEE 802.1x Protocol. |
ICFNDS |
2021 |
DBLP DOI BibTeX RDF |
|
8 | Nuno Marques, André Zúquete, João Paulo Barraca |
EAP-SH: An EAP Authentication Protocol to Integrate Captive Portals in the 802.1X Security Architecture. |
Wirel. Pers. Commun. |
2020 |
DBLP DOI BibTeX RDF |
|
8 | George Hallak, Tobias Frauenrath, Anil Mengi |
Security Concepts Based on IEEE 802.1X for G.hn Broadband PLC Access Networks. |
ISPLC |
2020 |
DBLP DOI BibTeX RDF |
|
8 | Nuno Marques, André Zúquete, João Paulo Barraca |
Integration of the Captive Portal paradigm with the 802.1X architecture. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
8 | Farrukh Chughtai, Riaz ul Amin, Abdul Sattar Malik, Nausheen Saeed |
Performance analysis of microsoft network policy server and freeRADIUS authentication systems in 802.1x based secured wired ethernet using PEAP. |
Int. Arab J. Inf. Technol. |
2019 |
DBLP BibTeX RDF |
|
8 | Mukhammad Andri Setiawan |
How 802.1x Enhances Knowledge Extraction from Large Scale Campus WiFi Deployment. |
KMIS |
2019 |
DBLP DOI BibTeX RDF |
|
8 | Biswanath Dey, S. S. Vishnu, Om Satyam Swarnkar |
An efficient dynamic key based EAP authentication framework for future IEEE 802.1x Wireless LANs. |
ICDSP |
2018 |
DBLP DOI BibTeX RDF |
|
8 | Frederik Hauser, Mark Schmidt 0002, Michael Menth |
Establishing a session database for SDN using 802.1X and multiple authentication resources. |
ICC |
2017 |
DBLP DOI BibTeX RDF |
|
8 | Edivaldo C. de A. Junior, Edson A. M. Avelar, Kelvin L. Dias, Paulo R. F. Cunha |
Mobility-Flow: Solução para Handover Transparente e com Suporte à Autenticação 802.1x em Redes OpenFlow. |
SBRC |
2017 |
DBLP BibTeX RDF |
|
8 | Kamal Benzekki, Abdeslam El Fergougui, Abdelbaki El Alaoui El Belrhiti |
Devolving IEEE 802.1X authentication capability to data plane in software-defined networking (SDN) architecture. |
Secur. Commun. Networks |
2016 |
DBLP DOI BibTeX RDF |
|
8 | Hanying Chen, Xiao-Li Liu |
An Enhanced Identity Authentication Security Access Control Model Based on 802.1x Protocol. |
FSDM |
2016 |
DBLP DOI BibTeX RDF |
|
8 | Berardino Carnevale, Francesco Falaschi, Diego Pacini, Gianluca Dini, Luca Fanucci |
A hardware accelerator for the IEEE 802.1X-2010 key hierarchy in automotive applications. |
AICCSA |
2015 |
DBLP DOI BibTeX RDF |
|
8 | Toshiki Watanabe, Shunichi Kinoshita, Yasuhiro Yamasaki, Hideaki Goto, Hideaki Sone |
Flexible Access and Priority Control System Based on 802.1X Authentication in Time of Disaster. |
COMPSAC Workshops |
2013 |
DBLP DOI BibTeX RDF |
|
8 | Abdulrahman Alruban, Emlyn Everitt |
Two Novel 802.1x Denial of Service Attacks. |
EISIC |
2011 |
DBLP DOI BibTeX RDF |
|
8 | Xiaodong Zhang 0001, Yumei Zhao, Yan Ma |
The Research and Realization of IEEE 802.1X and Account. |
ISCID (2) |
2009 |
DBLP DOI BibTeX RDF |
|
8 | Romano Fantacci, Leonardo Maccari, Tommaso Pecorella, Federico Frosali |
Analysis of secure handover for IEEE 802.1x-based wireless ad hoc networks. |
IEEE Wirel. Commun. |
2007 |
DBLP DOI BibTeX RDF |
|
8 | Kuang-Hui Chi, Ji-Han Jiang, Li-Hsing Yen |
Cost-Effective Caching for Mobility Support in IEEE 802.1X Frameworks. |
IEEE Trans. Mob. Comput. |
2006 |
DBLP DOI BibTeX RDF |
independent reference model, Robust Security Network, cache, Wireless Local Area Network, fast handoff |
8 | Leonardo Maccari, Romano Fantacci, Tommaso Pecorella, Federico Frosali |
Secure, fast handhoff techniques for 802.1X based wireless network. |
ICC |
2006 |
DBLP DOI BibTeX RDF |
|
8 | Jyh-Cheng Chen, Yu-Ping Wang |
Extensible authentication protocol (EAP) and IEEE 802.1x: tutorial and empirical experience. |
IEEE Commun. Mag. |
2005 |
DBLP DOI BibTeX RDF |
|
8 | Artur Hecker, Houda Labiod |
An efficient micromobility implementation for 802.1X WLANs. |
PIMRC |
2004 |
DBLP DOI BibTeX RDF |
|
8 | Artur Hecker, Houda Labiod |
Pre-authenticated signaling in wireless LANs using 802.1X access control. |
GLOBECOM |
2004 |
DBLP DOI BibTeX RDF |
|
8 | Ping Ding, JoAnne Holliday, Aslihan Celik |
Improving the security of wireless LANs by managing 802.1x disassociation. |
CCNC |
2004 |
DBLP DOI BibTeX RDF |
|
8 | Paul Congdon, Bernard Aboba, Andrew Smith, Glen Zorn, John Roese |
IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines. |
RFC |
2003 |
DBLP DOI BibTeX RDF |
|
8 | Pekka Nikander |
Authorization and Charging in Public WLANs Using FreeBSD and 802.1x. |
USENIX Annual Technical Conference, FREENIX Track |
2002 |
DBLP BibTeX RDF |
|
8 | Sangheon Pack, Yanghee Choi |
Pre-Authenticated Fast Handoff in a Public Wireless LAN Based on IEEE 802.1x Model. |
PWC |
2002 |
DBLP DOI BibTeX RDF |
|
5 | Zhenyu Wang, Xiangdong Li, Lining Yao, Qi Feng, Ruimin Wang |
Research on Endpoint Isolation and Remediation Mechanism Based on Trusted Access Technology. |
EUC (2) |
2008 |
DBLP DOI BibTeX RDF |
|
5 | Manuel Sánchez, Gabriel López Millán, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta |
Bootstrapping a Global SSO from Network Access Control Mechanisms. |
EuroPKI |
2007 |
DBLP DOI BibTeX RDF |
authorization, federation, SSO, SAML |
5 | Jongho Ryu |
EAP Using the Split Password-Based Authenticated Key Agreement. |
WISA |
2006 |
DBLP DOI BibTeX RDF |
|
5 | Dong Phil Kim, Seok Joo Koh, Sang Wook Kim |
An Integrated Scheme for Intrusion Detection in WLAN. |
ICOIN |
2006 |
DBLP DOI BibTeX RDF |
|
5 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
5 | Gabriel López 0001, Antonio Fernandez Gómez-Skarmeta, Rafael Marín López, Óscar Cánovas Reverte |
A Network Access Control Approach Based on the AAA Architecture and Authorization Attributes. |
IPDPS |
2005 |
DBLP DOI BibTeX RDF |
|
5 | Yusong Lin, Binqiang Wang, Zongmin Wang |
MixCast: A New Group Communication Model in Large-Scale Network. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
5 | Wen-Ting Wu, Jyh-Cheng Chen, Kai-Hsiu Chen, Kuo-Pao Fan |
Design and implementation of WIRE Diameter. |
ITRE |
2005 |
DBLP DOI BibTeX RDF |
|
5 | Il-Gon Kim, Jin-Young Choi |
Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking. |
AINA (2) |
2004 |
DBLP DOI BibTeX RDF |
|
5 | Jong-hu Lee, Jae-Cheol Ryou 0001 |
Strong User Authentication in IEEE802.11 Wireless LAN. |
Human.Society@Internet 2003 |
2003 |
DBLP DOI BibTeX RDF |
|
5 | Su Jung Yu, Joo-Seok Song |
An Improved Password Authentication Key Exchange Protocol for 802.11 Environment. |
ICCSA (2) |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #72 of 72 (100 per page; Change: )
|
|