Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
141 | Soundararajan Chandramathi, K. V. Arunkumar, S. Deivarayan, P. Sendhilkumar |
Fuzzy based dynamic WEP keymanagement for WLAN security enhancement. |
COMSWARE |
2008 |
DBLP DOI BibTeX RDF |
|
92 | Andrea Bittau, Mark Handley, Joshua Lackey |
The Final Nail in WEP's Coffin. |
S&P |
2006 |
DBLP DOI BibTeX RDF |
|
91 | Kevin Richardson, John A. Hamilton Jr., Martin C. Carlisle |
A performance analysis of the spring protocol through simulation. |
SpringSim (3) |
2007 |
DBLP BibTeX RDF |
SPRiNG, network simulation, wireless security, OPNET, WEP |
75 | Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin |
Breaking 104 Bit WEP in Less Than 60 Seconds. |
WISA |
2007 |
DBLP DOI BibTeX RDF |
|
75 | Adam Stubblefield, John Ioannidis, Aviel D. Rubin |
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). |
ACM Trans. Inf. Syst. Secur. |
2004 |
DBLP DOI BibTeX RDF |
wired equivalent privacy, Wireless security |
67 | Erik Tews, Martin Beck |
Practical attacks against WEP and WPA. |
WISEC |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, 802.11, rc4, wep, wlan, wpa, tkip |
67 | Mohammad Saleh, Iyad Al Khatib |
Performance of Secure Ad Hoc Sensor Networks Utilizing IEEE802.11b WEP. |
Systems Communications |
2005 |
DBLP DOI BibTeX RDF |
IEEE802.11b, security, sensor networks, performance, Ad hoc, WEP |
59 | Songhe Zhao, Charles A. Shoniregun |
Critical Review of Unsecured WEP. |
IEEE SCW |
2007 |
DBLP DOI BibTeX RDF |
|
59 | Toshihiro Ohigashi, Yoshiaki Shiraishi, Masakatu Morii |
FMS Attack-Resistant WEP Implementation Is Still Broken. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
58 | Serge Vaudenay, Martin Vuagnoux |
Passive-Only Key Recovery Attacks on RC4. |
Selected Areas in Cryptography |
2007 |
DBLP DOI BibTeX RDF |
key related attack, cryptanalysis, stream cipher, RC4, WEP |
58 | Jin-Cherng Lin, Yu-Hsin Kao, Chen-Wei Yang |
Secure Enhanced Wireless Transfer Protocol. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
IEEE 802.11 Family, SEWTP, WLAN, WEP, TKIP |
57 | Wen-Chuan Hsieh, Chi-Chun Lo, Jing-Chi Lee, Li-Tsung Huang |
The Implementation of a Proactive Wireless Intrusion Detection System. |
CIT |
2004 |
DBLP DOI BibTeX RDF |
Wireless Intrusion Detection System (WIDS), Wired Equivalent Privacy (WEP), 802.11, Short Message Service (SMS), Wireless Local Area Network (WLAN) |
49 | Avishai Wool |
A note on the fragility of the "Michael" message integrity code. |
IEEE Trans. Wirel. Commun. |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Itsik Mantin |
A Practical Attack on the Fixed RC4 in the WEP Mode. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
Related IV attacks, Cryptanalysis, Stream ciphers, Side-channel attacks, Fault analysis, RC4, Related key attacks |
42 | Chi Hyung In, Choong Seon Hong, Il Gyu Song |
A Scheme for Improving WEP Key Transmission between APs in Wireless Environment. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
41 | Douglas E. Ennis |
The wireless tightrope: an economical, secure, and user friendly approach for the wireless campus. |
SIGUCCS |
2005 |
DBLP DOI BibTeX RDF |
EAP-TLS, MSCHAPv2, PEAP, SSL certificates, SWAN, WLCCP, WEP, 802.1X |
41 | Jon Allen, Jeff Wilson |
Securing a wireless network. |
SIGUCCS |
2002 |
DBLP DOI BibTeX RDF |
EAP-LEAP, EAP-MD5, EAP-TLS, EAP-TTLS, VPN, WEP, 802.11i, 802.1x |
33 | Shaneel Narayan, Samad S. Kolahi, Yonathan Sunarto, Du D. T. Nguyen, Paul Mani |
The Influence of Wireless 802.11g LAN Encryption Methods on Throughput and Round Trip Time for Various Windows Operating Systems. |
CNSR |
2008 |
DBLP DOI BibTeX RDF |
Windows operating system, performance, wireless, throughput, encryption, response time |
33 | Samad S. Kolahi, Shaneel Narayan, Du D. T. Nguyen, Yonathan Sunarto, Paul Mani |
The impact of wireless LAN security on performance of different Windows operating systems. |
ISCC |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Gulsum Zeynep Gurkas Aydin, Abdül Halim Zaim, M. Ali Aydin |
Security Mechanisms And Their Performance Impacts On Wireless Local Area Networks. |
ISCN |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Sabine Kebreau, Barbu Constantinescu, Samuel Pierre |
A New Security Approach for WLAN. |
CCECE |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Avishai Wool |
Lightweight Key Management for IEEE 802.11 Wireless LANs with Key Refresh and Host Revocation. |
Wirel. Networks |
2005 |
DBLP DOI BibTeX RDF |
security, authentication |
33 | Duhyun Bae, Jiho Kim, Sehyun Park, Ohyoung Song |
Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Emmanuel López-Trejo, Francisco Rodríguez-Henríquez, Arturo Díaz-Pérez |
An FPGA Implementation of CCM Mode Using AES. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Ahmad M. Kholaif, Magda B. Fayek, Hussein Sherif Eissa, Hoda Baraka |
DRKH: A Power Efficient Encryption Protocol forWireless Devices. |
LCN |
2005 |
DBLP DOI BibTeX RDF |
Power Devices, Dynamic Re-keying, Key Hopping, Authentication, WLAN Security |
33 | Nikita Borisov, Ian Goldberg, David A. Wagner 0001 |
Intercepting mobile communications: the insecurity of 802.11. |
MobiCom |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Ren-Zun Lian, Xing-Yue Guo |
Work-Energy Principle (WEP)-Based Characteristic Mode Theory for Wireless Power Transfer Systems. |
ICCCS |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Zhengqiao Lu |
基于混沌和WEP的无线传感器网络加密研究 (Encryption of Wireless Sensor Networks Based on Chaos and WEP). |
计算机科学 |
2019 |
DBLP BibTeX RDF |
|
26 | José A. R. Pacheco de Carvalho, Hugo Veiga, Claudia F. F. P. Ribeiro Pacheco, Antonio D. Reis |
Performance Evaluation of IEEE 802.11a 54 Mbps WEP Multi-Node Laboratory Links. |
CSNDSP |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Yuhei Watanabe, Takahiro Iriyama, Masakatu Morii |
Proposal of WEP Operation with Strong IV and Its Implementation. |
J. Inf. Process. |
2017 |
DBLP DOI BibTeX RDF |
|
26 | José A. R. Pacheco de Carvalho, Hugo Veiga, Claudia F. F. P. Ribeiro Pacheco, Antonio D. Reis |
Laboratory performance measurements of IEEE 802.11 a WEP PTMP links. |
CSNDSP |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Masafumi Yamada, Tetsuya Oda, Yi Liu 0011, Masahiro Hiyama, Keita Matsuo, Leonard Barolli |
Performance Evaluation of an IoT-based e-Learning Testbed Considering OLSR and WEP Protocols. |
IMIS |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Cerstin Mahlow |
C-WEP―Rich Annotated Collection of Writing Errors by Professionals. |
LREC |
2016 |
DBLP BibTeX RDF |
|
26 | Pouyan Sepehrdad, Petr Susil, Serge Vaudenay, Martin Vuagnoux |
Tornado Attack on RC4 with Applications to WEP & WPA. |
IACR Cryptol. ePrint Arch. |
2015 |
DBLP BibTeX RDF |
|
26 | Mattia D'Antonio, Paolo D'Onorio De Meo, Daniele Paoletti, Berardino Elmi, Matteo Pallocca, Nico Sanna, Ernesto Picardi, Graziano Pesole, Tiziana Castrignanò |
WEP: a high-performance analysis pipeline for whole-exome data. |
BMC Bioinform. |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Rafik Chaabouni |
Break WEP Faster with Statistical Analysis. |
IACR Cryptol. ePrint Arch. |
2013 |
DBLP BibTeX RDF |
|
26 | Pouyan Sepehrdad, Petr Susil, Serge Vaudenay, Martin Vuagnoux |
Smashing WEP in a Passive Attack. |
FSE |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Md. Golam Rashed, M. Hasnat Kabir, Shaikh Enayet Ullah |
WEP: An Energy Efficient Protocol for Cluster Based Heterogeneous Wireless Sensor Network |
CoRR |
2012 |
DBLP BibTeX RDF |
|
26 | T. Tsukaune, Yosuke Todo, Masakatu Morii |
Proposal of a Secure WEP Operation against Existing Key Recovery Attacks and its Evaluation. |
AsiaJCIS |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Masakatu Morii, Yosuke Todo |
Cryptanalysis for RC4 and Breaking WEP/WPA-TKIP. |
IEICE Trans. Inf. Syst. |
2011 |
DBLP DOI BibTeX RDF |
|
26 | José A. R. Pacheco de Carvalho, Hugo Veiga, Nuno Marques, C. F. Ribeiro Pacheco, Antonio D. Reis |
TCP, UDP and FTP Performances of Laboratory Wi-Fi IEEE 802.11g WEP Point-to-Point Links. |
CENTERIS (2) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Ryoichi Teramura, Yasuo Asakura, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii |
Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Mustafa ElGili, Samani A. Talab, Awad H. Ali |
WEP and WPA Improvement. |
Wirel. Sens. Netw. |
2010 |
DBLP DOI BibTeX RDF |
|
26 | José A. R. Pacheco de Carvalho, Hugo Veiga, Nuno Marques, Claudia F. F. P. Ribeiro Pacheco, Antonio D. Reis |
A contribution to laboratory performance measurements of IEEE 802.11 a/g WEP point-to-point links using TCP, UDP and FTP. |
CSNDSP |
2010 |
DBLP DOI BibTeX RDF |
|
26 | José A. R. Pacheco de Carvalho, Hugo Veiga, Nuno Marques, C. F. Ribeiro Pacheco, Antonio D. Reis |
A Contribution to Laboratory Performance Measurements of IEEE 802.11 B, G WEP Point-to-Point Links. |
WINSYS |
2010 |
DBLP BibTeX RDF |
|
26 | Saif ur Rehman, Saeed Ullah, Sardar Ali |
On enhancing the WEP security against brute-force and compromised keys. |
CISIM |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Taskin Koçak, Mohit Jagetia |
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation. |
Comput. Commun. |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Kazukuni Kobara, Hideki Imai |
IVs to Skip for Immunizing WEP against FMS Attack. |
IEICE Trans. Commun. |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Soundararajan Chandramathi, K. V. Arunkumar, S. Deivarayan, P. Sendhilkumar, K. Vaithiyanathan |
Modified WEP key management for enhancing WLAN security. |
Int. J. Inf. Commun. Technol. |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Martin Beck, Erik Tews |
Practical attacks against WEP and WPA. |
IACR Cryptol. ePrint Arch. |
2008 |
DBLP BibTeX RDF |
|
26 | Halil-Ibrahim Bulbul, Ihsan Batmaz, Mesut Ozel |
Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Bogdan Crainicu, Florian Mircea Boian |
KSAm - An Improved RC4 Key-Scheduling Algorithm for Securing WEP. |
TeNe |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Longjun Zhang, Tao Zou |
An Improved Key Management Scheme for WEP. |
EUC (2) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Erik Tews |
Attacks on the WEP protocol. |
IACR Cryptol. ePrint Arch. |
2007 |
DBLP BibTeX RDF |
|
26 | Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin |
Breaking 104 bit WEP in less than 60 seconds. |
IACR Cryptol. ePrint Arch. |
2007 |
DBLP BibTeX RDF |
|
26 | Therverson Kanavathy |
Security Flaws in WEP Data Encryption Standard. |
ICWN |
2007 |
DBLP BibTeX RDF |
|
26 | Kevin Curran, Elaine Smyth |
Demonstrating the Wired Equivalent Privacy (WEP) Weaknesses Inherent in Wi-Fi Networks. |
Inf. Secur. J. A Glob. Perspect. |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Radomir Prodanovic, Dejan Simic |
Holistic approach to Wep protocol in securing wireless network infrastructure. |
Comput. Sci. Inf. Syst. |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Kazukuni Kobara, Hideki Imai |
Key-Dependent Weak IVs and Weak Keys in WEP - How to Trace Conditions Back to Their Patterns - . |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Ramzi A. Haraty, Walid El Horr |
A hybrid cryptosystem based on WEP for 802.11 networks. |
J. Comput. Methods Sci. Eng. |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Jin-Cherng Lin, Yu-Hsin Kao |
Burglarproof WEP Protocol on Wireless Infrastructure. |
PACIS |
2006 |
DBLP BibTeX RDF |
|
26 | Ramzi A. Haraty, Walid El Horr |
Securing wireless networks with enhanced WEP. |
CAINE |
2006 |
DBLP BibTeX RDF |
|
26 | Darshan Purandare, Ratan K. Guha, Joohan Lee |
An IV Collision Avoidance Algorithm - Strengthening the WEP. |
ICWN |
2005 |
DBLP BibTeX RDF |
|
26 | Darshan Purandare, Ratan K. Guha |
Enhancing Message Privacy in WEP. |
Wireless Information Systems |
2005 |
DBLP BibTeX RDF |
|
26 | Wen-Chuan Hsieh, Yi-Hsien Chiu, Chi-Chun Lo |
An Interference-Based Prevention Mechanism Against WEP Attack for 802.11B Network. |
Net-Con |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Arnulfo Ochoa Indart, Jesús Arturo Pérez Díaz |
Analysis of WEP Performance on Mobile Devices. |
WOSIS |
2004 |
DBLP BibTeX RDF |
|
26 | Giannis Pikrammenos, Ghassan Sarkis, John Soldatos 0001, Vasilios Anagnostopoulos |
Hidden Layer Authentication using Smart Card for WEP-based WLANS. |
SEC |
2003 |
DBLP BibTeX RDF |
|
26 | Adam Stubblefield, John Ioannidis, Aviel D. Rubin |
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. |
NDSS |
2002 |
DBLP BibTeX RDF |
|
26 | Panu Hämäläinen, Marko Hännikäinen, Timo Hämäläinen 0001, Jukka Saarinen |
Hardware implementation of the improved WEP and RC4 encryption algorithms for wireless terminals. |
EUSIPCO |
2000 |
DBLP BibTeX RDF |
|
26 | Dimitris Christodoulakis, Grammati E. Pantziou |
WEP - a workstation for education in programming. |
J. Syst. Softw. |
1988 |
DBLP DOI BibTeX RDF |
|
26 | M. Devos, Geert Adriaens, Yves D. Willems |
The Parallel Expert Parser (PEP): a thoroughly revised descendent of the Word Expert Parser (WEP). |
COLING |
1988 |
DBLP BibTeX RDF |
|
26 | Geert Adriaens |
WEP (Word Expert Parsing) Revised and Applied to Dutch. |
ECAI |
1986 |
DBLP BibTeX RDF |
|
25 | Subhasis Mukherjee, Maynul Hasan, Belal Chowdhury, Morshed U. Chowdhury |
Security of RFID Systems - A Hybrid Approach. |
SNPD |
2011 |
DBLP DOI BibTeX RDF |
IV, RFID, RSA, SCM, WEP |
25 | Gh. Rasool Begh, Ajaz Hussain Mir |
Quantification of the Effect of Security on Performance in Wireless LANs. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
Wireless LAN, TCP, Packet Loss, UDP, WEP, WPA |
25 | Carsten Maple, Helen Jacobs, Matthew Reeve |
Choosing the Right Wireless LAN Security Protocol for the Home and Business User. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
security, WLANs, WEP, WPA, TKIP |
25 | Shih Tsung Liang, Ming-Yi Weng |
Protecting IEEE 802.11 Wireless LANs against the FCS False Blocking Attack. |
ICPADS (1) |
2005 |
DBLP DOI BibTeX RDF |
false blocking attack, FCS false blocking detection and recovery, WLAN, IEEE 802.11, WEP |
25 | Pascal Meunier, Sofie Nystrom, Seny Kamara, Scott Yost, Kyle Alexander, Dan Noland, Jared Crane |
ActiveSync, TCP/IP and 802.11b Wireless Vulnerabilities of WinCE-Based PDAs. |
WETICE |
2002 |
DBLP DOI BibTeX RDF |
WinCE, ActiveSync, security, wireless, vulnerability, WEP, 802.11b |
24 | Steven K. Brawn, R. Mark Koan, Kelly Caye |
Staying secure in an insecure world: 802.1x secure wireless computer connectivity for students, faculty, and staff to the campus network. |
SIGUCCS |
2004 |
DBLP DOI BibTeX RDF |
PEAP, dynamic WEP, wireless network, authentication, VPN, 802.1x |
16 | Jie Xiong 0001, Kyle Jamieson |
SecureAngle: improving wireless security using angle-of-arrival information (poster abstract). |
SIGCOMM |
2010 |
DBLP DOI BibTeX RDF |
SecureAngle, wireless, 802.11, angle of arrival |
16 | Bo Yan, Guanling Chen, Jie Wang 0002, Hongda Yin |
Robust Detection of Unauthorized Wireless Access Points. |
Mob. Networks Appl. |
2009 |
DBLP DOI BibTeX RDF |
intrusion detection, IEEE 802.11, wireless security, rogue AP |
16 | Andrew Gin, Ray Hunt |
Performance analysis of evolving wireless IEEE 802.11 security architectures. |
Mobility Conference |
2008 |
DBLP DOI BibTeX RDF |
IEEE 802.1x, TKIP (temporal key integrity protocol), WiFi protected access (WPA, WPA2), performance analysis, wireless LAN, PDA (personal digital assistant), IEEE 802.11i |
16 | Hongda Yin, Guanling Chen, Jie Wang 0002 |
Detecting protected layer-3 rogue APs. |
BROADNETS |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Raheel A. Malik, Raymond A. Hansen, James E. Goldman, Anthony H. Smith |
Laboratory modules for conducting comparative analysis of 802.11 frames. |
SIGITE Conference |
2007 |
DBLP DOI BibTeX RDF |
wireless networking education, information technology education |
16 | Binod Vaidya, SangDuck Lee, Jae-Kyun Han, Seung Jo Han |
Authentication Mechanism Using One-Time Password for 802.11 Wireless LAN. |
CSR |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Dong Phil Kim, Seok Joo Koh, Sang Wook Kim |
An Integrated Scheme for Intrusion Detection in WLAN. |
ICOIN |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Raquel Lacuesta Gilaberte, Lourdes Peñalver Herrero |
Spontaneous networks: Trust in a world of equals. |
ICNS |
2006 |
DBLP DOI BibTeX RDF |
|
16 | René Neumerkel, Stephan Groß |
A Sophisticated Solution for Revealing Attacks on Wireless LAN. |
TrustBus |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Kjell Jørgen Hole, Erlend Dyrnes, Per Thorsheim |
Securing Wi-Fi Networks. |
Computer |
2005 |
DBLP DOI BibTeX RDF |
wireless hacking, wireless security, virtual private networks, Wi-Fi networks |
16 | Fernando C. Colón Osorio, Emmanuel Agu, Kerry McKay |
Measuring energy-security tradeoffs in wireless networks. |
IPCCC |
2005 |
DBLP DOI BibTeX RDF |
|
16 | George Dean Bissias, Marc Liberatore, David D. Jensen, Brian Neil Levine |
Privacy Vulnerabilities in Encrypted HTTP Streams. |
Privacy Enhancing Technologies |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Hamdy S. Soliman, Mohammed Omari |
Application of synchronous dynamic encryption system in mobile wireless domains. |
Q2SWinet |
2005 |
DBLP DOI BibTeX RDF |
dynamic encryption, flexible integrity, integrity violations, mobile network security, permutation vectors, seamless handover |
16 | Debabrata Nayak, Deepak B. Phatak, Ved Prakash Gulati |
Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, P. Sasikala, Seoung-Hyeon Lee, Jae-Kwang Lee |
Security Threats and Countermeasures in WLAN. |
AINTEC |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Stephen Michell, Kannan Srinivasan |
State based key hop protocol: a lightweight security protocol for wireless networks. |
PE-WASUN |
2004 |
DBLP DOI BibTeX RDF |
low power security, state based encryption, wireless security, computer network security, wireless sensor network security |
16 | Hea Suk Jo, Hee Yong Youn |
A New Synchronization Protocol for Authentication in Wireless LAN Environment. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Hea Suk Jo, Hee Yong Youn |
A New Synchronization Protocol for Authentication in Wireless LAN Environment. |
ICCSA (3) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Tadashi Komori, Takamichi Saito |
A Secure Wireless LAN System Retaining Privacy. |
AINA (2) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Florina Almenárez, Daniel Díaz Sánchez, Andrés Marín López |
Secure Ad-Hoc mBusiness: EnhancingWindowsCE Security. |
TrustBus |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Daniel B. Faria, David R. Cheriton |
MobiCom poster: public-key-based secure Internet access. |
ACM SIGMOBILE Mob. Comput. Commun. Rev. |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Daniel B. Faria, David R. Cheriton |
DoS and authentication in wireless public access networks. |
Workshop on Wireless Security |
2002 |
DBLP DOI BibTeX RDF |
security, wireless networks, DoS |