The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase 802.11i (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2002-2005 (26) 2006 (20) 2007 (15) 2008-2009 (18) 2010-2018 (15)
Publication types (Num. hits)
article(13) book(1) inproceedings(80)
Venues (Conferences, Journals, ...)
ICOIN(3) Q2SWinet(3) Workshop on Wireless Security(3) ARES(2) CIS (2)(2) ICISC(2) ISCN(2) IWCMC(2) Mobility Conference(2) ACNS(1) ACSAC(1) ACSW(1) AICCSA(1) AICT(1) ASICON(1) ASP-DAC(1) More (+10 of total 81)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 90 occurrences of 53 keywords

Results
Found 94 publication records. Showing 94 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
133Changhua He, Mukund Sundararajan, Anupam Datta, Ante Derek, John C. Mitchell A modular correctness proof of IEEE 802.11i and TLS. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF protocol composition logic, TLS, IEEE 802.11i
130Aidil Izani Jafri, Yean Li Ho ANonce encryption in 802.11i 4-way handshake protocol. Search on Bibsonomy MoMM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF 4-way handshake protocol, ANonce, 802.11i, DoS attack, WLAN security
121Alexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis On RSN-Oriented Wireless Intrusion Detection. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Robust Security Network, Intrusion Detection, 802.11i
102Jörg Rech Wireless LANs - 802.11-WLAN-Technologie und praktische Umsetzung im Detail: 802.11a/h: 802.11b: 802.11g: 802.11i: 802.11n: 802.11d: 802.11e: 802.11f: 802.11s (3. Aufl.). Search on Bibsonomy 2008   RDF
101Hareesh Khattri, Rajendra S. Katti Implementation and performance analysis of IEEE 802.11i standard using the IXP425 network processor. Search on Bibsonomy PE-WASUN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
96Zeeshan Furqan, Shahabuddin Muhammad, Ratan K. Guha Formal Verification of 802.11i using Strand Space Formalism. Search on Bibsonomy ICN/ICONS/MCL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
94Duhyun Bae, Jiho Kim, Sehyun Park, Ohyoung Song Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
93Changhua He, John C. Mitchell Analysis of the 802.11i 4-way handshake. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2004 DBLP  DOI  BibTeX  RDF 4-way handshake, authentication, WLAN, key management, denial-of-service, 802.11i
89Guido R. Hiertz, Sebastian Max, Rui Zhao, Dee Denteneer, Lars Berlemann Principles of IEEE 802.11s. Search on Bibsonomy ICCCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
85Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole Bai, Dong Xuan Link-layer protection in 802.11i WLANS with dummy authentication. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dummy authentication, security, wlan, open access
81Purificación Sáiz, Jon Matías, Eduardo Jacob, Javier Bustamante, Armando Astarloa Adaptation of IEEE 802.1X for Secure Session Establishment Between Ethernet Peers. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
80You Sung Kang, KyungHee Oh, Byung-Ho Chung, Kyoil Chung, DaeHun Nyang Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism. Search on Bibsonomy ICOIN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF 802.11i, 802.1X, WPA, WLAN security
80Songhe Zhao, Charles A. Shoniregun, Chris Imafidon Addressing the vulnerability of the 4-way handshake of 802.11i. Search on Bibsonomy ICDIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
80Elankayer Sithirasenan, Saad Zafar, Vallipuram Muthukkumarasamy Formal Verification of the IEEE 802.11i WLAN Security Protocol. Search on Bibsonomy ASWEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
79Duhyun Bae, Gwanyeon Kim, Jiho Kim, Sehyun Park, Ohyoung Song Design and Implementation of Efficient Cipher Engine for IEEE 802.11i Compatible with IEEE 802.11n and IEEE 802.11e. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
74Mansoor Ahmed Khan, Ahmad Raza Cheema, Aamir Hasan 0001 Improved Nonce Construction Scheme for AES CCMP to Evade Initial Counter Prediction. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AES CCMP, Initial Counter, Key Length, TMTO, Integrity, Encryption, Confidentiality, Nonce, IEEE 802.11i
71Ju-A Lee, Jae-Hyun Kim, Jun-Hee Park, Kyung-Duk Moon A Secure Wireless LAN Access Technique for Home Network. Search on Bibsonomy VTC Spring The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
67M. Razvi Doomun, K. M. S. Soyjaudah Adaptive IEEE 802.11i Security for Energy-Security Optimization. Search on Bibsonomy AICT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF energy-efficient, Wireless, adaptive security, IEEE 802.11i
65Sangeetha L. Bangolae, Carol Bell, Emily Qi Performance study of fast BSS transition using IEEE 802.11r. Search on Bibsonomy IWCMC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IEEE 802.11r standard, fast BSS transition, fast roaming, performance, wireless LAN
59Shirantha Wijesekera, Xu Huang 0001, Dharmendra Sharma 0001 Multi-Agent Based Approach for Quantum Key Distribution in WiFi Networks. Search on Bibsonomy KES-AMSTA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Quantum Key Distribution (QKD), MAS, WiFi, 802.11i
58Rodolphe Marques, André Zúquete Fast, secure handovers in 802.11: back to the basis. Search on Bibsonomy Q2SWinet The full citation details ... 2008 DBLP  DOI  BibTeX  RDF 802.11 roaming, 802.1x authentication, fast reauthentication, fast handover
58Aftab Ahmad, Mona El-Kadi, Stephan Olariu Common data security network (CDSN). Search on Bibsonomy Q2SWinet The full citation details ... 2005 DBLP  DOI  BibTeX  RDF common data security, security plane, wireless LANs, security architecture, IEEE 802.11i, TKIP
58Mohamed Kassab, Abdelfattah Belghith, Jean-Marie Bonnin, Sahbi Sassi Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks. Search on Bibsonomy WMuNeP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF IAPP, pre-authentication, re-authentication, handover, WiFi, IEEE 802.11i
55Gulsum Zeynep Gurkas Aydin, Abdül Halim Zaim, M. Ali Aydin Security Mechanisms And Their Performance Impacts On Wireless Local Area Networks. Search on Bibsonomy ISCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
55Ulrike Meyer, Jared Cordasco, Susanne Wetzel An approach to enhance inter-provider roaming through secret sharing and its application to WLANs. Search on Bibsonomy WMASH The full citation details ... 2005 DBLP  DOI  BibTeX  RDF EAP-TLS-KS, distributed DSS, inter-provider roaming, micropayment scheme, WLAN, secret sharing, PKI, 802.11i
54Jianyong Huang, Jennifer Seberry, Willy Susilo, Martin W. Bunder Security Analysis of Michael: The IEEE 802.11i Message Integrity Code. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
54Fan Zhang, Jianfeng Ma 0001, Sang-Jae Moon The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11i. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
46Avishai Wool A note on the fragility of the "Michael" message integrity code. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
41Georg Lukas, Christian Fackroth WMNSec: security for wireless mesh networks. Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, mobility, authentication, wireless mesh networks
41Junbeom Hur, Chanil Park, Young-joo Shin, Hyunsoo Yoon An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks. Search on Bibsonomy ICOIN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
40David Q. Liu, Mark Coslow Extensible authentication protocols for IEEE standards 802.11 and 802.16. Search on Bibsonomy Mobility Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF extensible authentication protocol, wireless, IEEE 802.11, EAP
35Sachin Garg, Martin Kappes, Mahalingam Mani Wireless access server for quality of service and location based access control in 802.11 networks. Search on Bibsonomy ISCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
34Martin Eian Fragility of the Robust Security Network: 802.11 Denial of Service. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF 802.11w, Security, Wireless, Denial of Service, 802.11, 802.11i
34Christos Xenakis, Christoforos Ntantogian Security architectures for B3G mobile networks. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF B3G networks, EAP-SIM, EAP-AKA, WLAN, 3G, 802.11i, IKEv2
34Jon Allen, Jeff Wilson Securing a wireless network. Search on Bibsonomy SIGUCCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF EAP-LEAP, EAP-MD5, EAP-TLS, EAP-TTLS, VPN, WEP, 802.11i, 802.1x
34Yuteng Lu, Meng Sun 0002 Modeling and Verification of IEEE 802.11i Security Protocol in UPPAAL for Internet of Things. Search on Bibsonomy Int. J. Softw. Eng. Knowl. Eng. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
34Yuteng Lu, Meng Sun 0002 Modeling and Verification of IEEE 802.11i Security Protocol for Internet of Things. Search on Bibsonomy SEKE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
34Michael Gonzales, Paul Duncan, Kerssy Fermin, Roshad A. Guerrier, Abdelrahman Elleithy Enhancing IEEE 802.11i Standard using Quantum Cryptograp. Search on Bibsonomy UEMCON The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
34Aymen Ghilen, Mostafa Azizi, Ridha Bouallegue Enhancing the Security of IEEE 802.11i Standard by Integrating a Quantum Scheme for Authentication and Encryption Key Distribution. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
34Bahareh Shojaie, Iman Saberi, Mazleena Salleh Enhancing EAP-TLS authentication protocol for IEEE 802.11i. Search on Bibsonomy Wirel. Networks The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
34R. Velayutham, D. Manimegalai CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE 802.11i): A Comparison with DES and RSA. Search on Bibsonomy J. Comput. Sci. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
34Rajeev Singh, Teek Parval Sharma On the IEEE 802.11i security: a denial-of-service perspective. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
34Aymen Ghilen, Mostafa Azizi, Ridha Bouallegue Integration of a quantum protocol for mutual authentication and secret key distribution within 802.11i standard. Search on Bibsonomy AICCSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
34Andres S. Troya, Jaime J. Astudillo, Carlos G. Romero, Fabian G. Saenz, Javier Díaz Vulnerability detection in 802.11i wireless networks through link layer analysis. Search on Bibsonomy LATINCOM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
34Abdullah A. Alabdulatif, Xiaoqi Ma, Lars Nolle Analysing and attacking the 4-way handshake of IEEE 802.11i standard. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
34Jaesung Park Secure handoff method for seamless service provisioning in infrastructure mode 802.11i system. Search on Bibsonomy ICOIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
34Iman Saberi, Bahareh Shojaie, Mazleena Salleh, Mahan Niknafskermani, Mohammad Javad Rostami Preventing TMTO Attack in AES-CCMP in IEEE 802.11i. Search on Bibsonomy CN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
34Yang Li, Jun Han 0003, Shuai Wang, Junbao Liu, Xiaoyang Zeng A NoC-based multi-core architecture for IEEE 802.11i CCMP. Search on Bibsonomy ASICON The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
34Ignacio Algredo-Badillo, Claudia Feregrino Uribe, René Cumplido, Miguel Morales-Sandoval Efficient hardware architecture for the AES-CCM protocol of the IEEE 802.11i standard. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
34Martin Eian A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP. Search on Bibsonomy CANS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
34Jing Liu 0003, Xinming Ye, Jun Zhang 0001, Jun Li 0002 Security Verification of 802.11i 4-Way Handshake Protocol. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Jung-Ho Lee, Sung-Rok Yoon, Kwang-Eui Pyun, Sin-Chong Park A Multi-Processor NoC platform applied on the 802.11i TKIP cryptosystem. Search on Bibsonomy ASP-DAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Xinyu Xing, Elhadi M. Shakshuki, Darcy G. Benoit, Tarek R. Sheltami Security Analysis and Authentication Improvement for IEEE 802.11i Specification. Search on Bibsonomy GLOBECOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Sung-Hyun Eum, Sung-Jae Cho, Hyoung-Kee Choi, Hyunseung Choo A Robust Session Key Distribution in 802.11i. Search on Bibsonomy ICCSA Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Arshad Aziz, Nassar Ikram An FPGA-based AES-CCM Crypto Core For IEEE 802.11i Architecture. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2007 DBLP  BibTeX  RDF
34Hung-Yu Chien, Yuan-Liang Tang, Tzu-Hang Hsu Secure Fast Pre-authentication Based on IEEE 802.11i. Search on Bibsonomy IMECS The full citation details ... 2007 DBLP  BibTeX  RDF
34Sunil K. Venugopal, Chirag Parikh, Parimal Patel Implementation of an IEEE 802.11i based Wireless Security System. Search on Bibsonomy HPCNCS The full citation details ... 2007 DBLP  BibTeX  RDF
34Abdul Samiah, Arshad Aziz, Nassar Ikram An Efficient Software Implementation of AES-CCM for IEEE 802.11i Wireless St. Search on Bibsonomy COMPSAC (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Alexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis Towards effective Wireless Intrusion Detection in IEEE 802.11i. Search on Bibsonomy SECPerU The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Floriano De Rango, Dionigi Cristian Lentini, Salvatore Marano Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i. Search on Bibsonomy EURASIP J. Wirel. Commun. Netw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Thi Mai Trang Nguyen, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie 802.11i Encryption Key Distribution Using Quantum Cryptography. Search on Bibsonomy J. Networks The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Wei Han, Dong Zheng 0001, Kefei Chen Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
34Xiao Liu, Abraham O. Fapojuwo Formal Evaluation of Major Authentication Methods for IEEE 802.11i WLAN Standard. Search on Bibsonomy VTC Fall The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Stefan Lindskog, Anna Brunström, Zoltán Faigl, Katalin Toth Providing Tunable Security Services: An IEEE 802.11i Example. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34N. Manivannan, P. Neelameham Alternative Pair-wise Key Exchange Protocols (IEEE 802.11i) in Wireless LANs. Search on Bibsonomy ICWMC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Jyh-Cheng Chen, Ming-Chia Jiang, Yi-Wen Liu Wireless LAN security and IEEE 802.11i. Search on Bibsonomy IEEE Wirel. Commun. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Changhua He, John C. Mitchell Security Analysis and Improvements for IEEE 802.11i. Search on Bibsonomy NDSS The full citation details ... 2005 DBLP  BibTeX  RDF
34Ho Yung Jang, Joon Hyoung Shim, Jung Hee Suk, In Cheol Hwang, Jun Rim Choi Compatible design of CCMP and OCB AES cipher using separated encryptor and decryptor for IEEE 802.11i. Search on Bibsonomy ISCAS (3) The full citation details ... 2004 DBLP  BibTeX  RDF
33Andrew Gin, Ray Hunt Performance analysis of evolving wireless IEEE 802.11 security architectures. Search on Bibsonomy Mobility Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IEEE 802.1x, TKIP (temporal key integrity protocol), WiFi protected access (WPA, WPA2), performance analysis, wireless LAN, PDA (personal digital assistant), IEEE 802.11i
30Jaesung Park, Beomjoon Kim, Iksoon Hwang Secure and Seamless Handoff Scheme for a Wireless LAN System. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Ghazanfar Ali Safdar, Clare McGrath, Máire McLoone Limitations of existing wireless networks authentication and key management techniques for MANETs. Search on Bibsonomy ISCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Mohamed Kassab, Abdelfattah Belghith, Jean-Marie Bonnin, Sahbi Sassi Fast and secure handoffs for 802.11 Infrastructure Networks. Search on Bibsonomy Net-Con The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Duhyun Bae, Gwanyeon Kim, Jiho Kim, Sehyun Park, Ohyoung Song An Efficient Design of CCMP for Robust Security Network. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Xu Huang 0001, Dharmendra Sharma 0001 Multi-Agent Systems in Quantum Security for Modern Wireless Networks. Search on Bibsonomy KES (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Rafael Marín López, Ashutosh Dutta, Yoshihiro Ohba, Henning Schulzrinne, Antonio Fernandez Gómez-Skarmeta Network-Layer Assisted Mechanism to Optimize Authentication Delay during Handoff in 802.11 Networks. Search on Bibsonomy MobiQuitous The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Junbeom Hur, Chanil Park, Hyunsoo Yoon An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF proactive key distribution, pre-authentication, IEEE 802.11 network, vehicular network, fast handoff
25Andrea G. Forte, Henning Schulzrinne Cooperation Between Stations in Wireless Networks. Search on Bibsonomy ICNP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Elankayer Sithirasenan, Vallipuram Muthukkumarasamy Detecting Security Threats in Wireless LANs Using Timing and Behavioral Anomalies. Search on Bibsonomy ICON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Hassnaa Moustafa, Gilles Bourdon, Yvon Gourhant Providing Authentication and Access Control in Vehicular Network Environment. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Thi Mai Trang Nguyen, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie Integration of Quantum Cryptography in 802.11 Networks. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Rupinder Gill, Jason Smith 0001, Andrew J. Clark Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks. Search on Bibsonomy ACSW The full citation details ... 2006 DBLP  BibTeX  RDF session hi-jacking, wireless intrusion detection, round trip time, received signal strength, passive monitoring
25Daniel B. Faria, David R. Cheriton Detecting identity-based attacks in wireless networks using signalprints. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IEEE 802.11., security, wireless LANs, location-based services, denial-of-service attacks
25Rainer Huber, Norbert Jordan An Experimental Study of a Business Domain Independent Application Level and Internet Access Authentication and Authorization Concept. Search on Bibsonomy ICMB The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Finn Michael Halvorsen, Olav Haugen, Martin Eian, Stig Fr. Mjølsnes An Improved Attack on TKIP. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Fabio Martignon, Stefano Paris, Antonio Capone MobiSEC: a novel security architecture for wireless mesh networks. Search on Bibsonomy Q2SWinet The full citation details ... 2008 DBLP  DOI  BibTeX  RDF experimental test-bed, security, authentication, wireless mesh networks
21Duncan A. Grove, Toby C. Murray, Chris A. Owen, Chris J. North, J. A. Jones, Mark R. Beaumont, Bradley D. Hopkins An Overview of the Annex System. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Jin-Cherng Lin, Yu-Hsin Kao, Chen-Wei Yang Secure Enhanced Wireless Transfer Protocol. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IEEE 802.11 Family, SEWTP, WLAN, WEP, TKIP
21René Neumerkel, Stephan Groß A Sophisticated Solution for Revealing Attacks on Wireless LAN. Search on Bibsonomy TrustBus The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Panu Hämäläinen, Jari Heikkinen, Marko Hännikäinen, Timo D. Hämäläinen Design of Transport Triggered Architecture Processors for Wireless Encryption. Search on Bibsonomy DSD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Hassnaa Moustafa, Gilles Bourdon, Yvon Gourhant AAA in vehicular communication on highways with ad hoc networking support: a proposed architecture. Search on Bibsonomy Vehicular Ad Hoc Networks The full citation details ... 2005 DBLP  DOI  BibTeX  RDF inter-vehicular routing, security, ad hoc networks, AAA, vehicular communications
21Fan Zhang, Jianfeng Ma 0001 Security Analysis on Chinese Wireless LAN Standard and Its Solution. Search on Bibsonomy ICPP Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Emmanuel López-Trejo, Francisco Rodríguez-Henríquez, Arturo Díaz-Pérez An FPGA Implementation of CCM Mode Using AES. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Thilo Pionteck, Thorsten Staake, Thomas Stiefmeier, Lukusa D. Kabulepa, Manfred Glesner On the design of a function-specific reconfigurable: hardware accelerator for the MAC-layer in WLANs. Search on Bibsonomy FPGA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Jiejun Kong, Shirshanka Das, Edward Tsai, Mario Gerla ESCORT: a decentralized and localized access control system for mobile wireless access to secured domains. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF decentralized access control, identity privacy, mobile privacy, location privacy, wireless security
Displaying result #1 - #94 of 94 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license