Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
133 | Changhua He, Mukund Sundararajan, Anupam Datta, Ante Derek, John C. Mitchell |
A modular correctness proof of IEEE 802.11i and TLS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 2-15, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
protocol composition logic, TLS, IEEE 802.11i |
130 | Aidil Izani Jafri, Yean Li Ho |
ANonce encryption in 802.11i 4-way handshake protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MoMM ![In: MoMM'2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia, 14-16 December 2009, Kuala Lumpur, Malaysia, pp. 475-480, 2009, ACM, 978-1-60558-659-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
4-way handshake protocol, ANonce, 802.11i, DoS attack, WLAN security |
121 | Alexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis |
On RSN-Oriented Wireless Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (2) ![In: On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part II, pp. 1601-1615, 2007, Springer, 978-3-540-76835-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Robust Security Network, Intrusion Detection, 802.11i |
102 | Jörg Rech |
Wireless LANs - 802.11-WLAN-Technologie und praktische Umsetzung im Detail: 802.11a/h: 802.11b: 802.11g: 802.11i: 802.11n: 802.11d: 802.11e: 802.11f: 802.11s (3. Aufl.). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2008 |
RDF |
|
101 | Hareesh Khattri, Rajendra S. Katti |
Implementation and performance analysis of IEEE 802.11i standard using the IXP425 network processor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PE-WASUN ![In: Proceedings of the 2nd ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks, PE-WASUN 2005, Montreal, Quebec, Canada, October 10-13, 2005, pp. 275-276, 2005, ACM, 1-59593-182-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
96 | Zeeshan Furqan, Shahabuddin Muhammad, Ratan K. Guha |
Formal Verification of 802.11i using Strand Space Formalism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN/ICONS/MCL ![In: Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 23-29 April 2006, Mauritius, pp. 140, 2006, IEEE Computer Society, 0-7695-2552-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
94 | Duhyun Bae, Jiho Kim, Sehyun Park, Ohyoung Song |
Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 346-357, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
93 | Changhua He, John C. Mitchell |
Analysis of the 802.11i 4-way handshake. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Wireless Security ![In: Proceedings of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004, pp. 43-50, 2004, ACM, 1-58113-925-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
4-way handshake, authentication, WLAN, key management, denial-of-service, 802.11i |
89 | Guido R. Hiertz, Sebastian Max, Rui Zhao, Dee Denteneer, Lars Berlemann |
Principles of IEEE 802.11s. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 16th International Conference on Computer Communications and Networks, IEEE ICCCN 2007, Turtle Bay Resort, Honolulu, Hawaii, USA, August 13-16, 2007, pp. 1002-1007, 2007, IEEE, 978-1-4244-1251-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
85 | Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole Bai, Dong Xuan |
Link-layer protection in 802.11i WLANS with dummy authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 131-138, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
dummy authentication, security, wlan, open access |
81 | Purificación Sáiz, Jon Matías, Eduardo Jacob, Javier Bustamante, Armando Astarloa |
Adaptation of IEEE 802.1X for Secure Session Establishment Between Ethernet Peers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings, pp. 220-234, 2006, Springer, 3-540-68962-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
80 | You Sung Kang, KyungHee Oh, Byung-Ho Chung, Kyoil Chung, DaeHun Nyang |
Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Networking Technologies for Broadband and Mobile Networks, International Conference ICOIN 2004, Busan, Korea, February 18-20, 2004, Revised Selected Papers, pp. 915-924, 2004, Springer, 3-540-23034-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
802.11i, 802.1X, WPA, WLAN security |
80 | Songhe Zhao, Charles A. Shoniregun, Chris Imafidon |
Addressing the vulnerability of the 4-way handshake of 802.11i. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDIM ![In: Third IEEE International Conference on Digital Information Management (ICDIM), November 13-16, 2008, London, UK, Proceedings, pp. 351-356, 2008, IEEE, 978-1-4244-2917-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
80 | Elankayer Sithirasenan, Saad Zafar, Vallipuram Muthukkumarasamy |
Formal Verification of the IEEE 802.11i WLAN Security Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASWEC ![In: 17th Australian Software Engineering Conference (ASWEC 2006), 18-21 April 2006, Sydney, Australia, pp. 181-190, 2006, IEEE Computer Society, 0-7695-2551-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
79 | Duhyun Bae, Gwanyeon Kim, Jiho Kim, Sehyun Park, Ohyoung Song |
Design and Implementation of Efficient Cipher Engine for IEEE 802.11i Compatible with IEEE 802.11n and IEEE 802.11e. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 439-444, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
74 | Mansoor Ahmed Khan, Ahmad Raza Cheema, Aamir Hasan 0001 |
Improved Nonce Construction Scheme for AES CCMP to Evade Initial Counter Prediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand, pp. 307-311, 2008, IEEE Computer Society, 978-0-7695-3263-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
AES CCMP, Initial Counter, Key Length, TMTO, Integrity, Encryption, Confidentiality, Nonce, IEEE 802.11i |
71 | Ju-A Lee, Jae-Hyun Kim, Jun-Hee Park, Kyung-Duk Moon |
A Secure Wireless LAN Access Technique for Home Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Spring ![In: Proceedings of the 63rd IEEE Vehicular Technology Conference, VTC Spring 2006, 7-10 May 2006, Melbourne, Australia, pp. 818-822, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
67 | M. Razvi Doomun, K. M. S. Soyjaudah |
Adaptive IEEE 802.11i Security for Energy-Security Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICT ![In: Third Advanced International Conference on Telecommunications (AICT 2007), May 13-19, 2007, Mauritius, pp. 38, 2007, IEEE Computer Society, 0-7695-2843-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
energy-efficient, Wireless, adaptive security, IEEE 802.11i |
65 | Sangeetha L. Bangolae, Carol Bell, Emily Qi |
Performance study of fast BSS transition using IEEE 802.11r. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing, IWCMC 2006, Vancouver, British Columbia, Canada, July 3-6, 2006, pp. 737-742, 2006, ACM, 1-59593-306-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
IEEE 802.11r standard, fast BSS transition, fast roaming, performance, wireless LAN |
59 | Shirantha Wijesekera, Xu Huang 0001, Dharmendra Sharma 0001 |
Multi-Agent Based Approach for Quantum Key Distribution in WiFi Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES-AMSTA ![In: Agent and Multi-Agent Systems: Technologies and Applications, Third KES International Symposium, KES-AMSTA 2009, Uppsala, Sweden, June 3-5, 2009. Proceedings, pp. 293-303, 2009, Springer, 978-3-642-01664-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Quantum Key Distribution (QKD), MAS, WiFi, 802.11i |
58 | Rodolphe Marques, André Zúquete |
Fast, secure handovers in 802.11: back to the basis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Q2SWinet ![In: Q2SWinet'08 - Proceedings of the 4th ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Vancouver, British Columbia, Canada, October 27-28, 2008, pp. 27-34, 2008, ACM, 978-1-60558-237-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
802.11 roaming, 802.1x authentication, fast reauthentication, fast handover |
58 | Aftab Ahmad, Mona El-Kadi, Stephan Olariu |
Common data security network (CDSN). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Q2SWinet ![In: Q2SWinet'05 - Proceedings of the First ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Montreal, Quebec, Canada, October 13, 2005, pp. 1-7, 2005, ACM, 1-59593-241-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
common data security, security plane, wireless LANs, security architecture, IEEE 802.11i, TKIP |
58 | Mohamed Kassab, Abdelfattah Belghith, Jean-Marie Bonnin, Sahbi Sassi |
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WMuNeP ![In: WMuNeP'05 - Proceedings of the First ACM Workshop on Wireless Multimedia Networking and Performance Modeling, Montreal, Quebec, Canada, October 13, 2005, pp. 46-53, 2005, ACM, 1-59593-183-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
IAPP, pre-authentication, re-authentication, handover, WiFi, IEEE 802.11i |
55 | Gulsum Zeynep Gurkas Aydin, Abdül Halim Zaim, M. Ali Aydin |
Security Mechanisms And Their Performance Impacts On Wireless Local Area Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCN ![In: Proceedings of the International Symposium on Computer Networks, ISCN 2006, June 16-18, 2006, Istanbul, Turkey, pp. 123-127, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
55 | Ulrike Meyer, Jared Cordasco, Susanne Wetzel |
An approach to enhance inter-provider roaming through secret sharing and its application to WLANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WMASH ![In: Proceedings of the 3rd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, WMASH 2005, Cologne, Germany, September 2, 2005, pp. 1-13, 2005, ACM, 1-59593-143-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
EAP-TLS-KS, distributed DSS, inter-provider roaming, micropayment scheme, WLAN, secret sharing, PKI, 802.11i |
54 | Jianyong Huang, Jennifer Seberry, Willy Susilo, Martin W. Bunder |
Security Analysis of Michael: The IEEE 802.11i Message Integrity Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings, pp. 423-432, 2005, Springer, 3-540-30803-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
54 | Fan Zhang, Jianfeng Ma 0001, Sang-Jae Moon |
The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11i. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 488-493, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Avishai Wool |
A note on the fragility of the "Michael" message integrity code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 3(5), pp. 1459-1462, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
41 | Georg Lukas, Christian Fackroth |
WMNSec: security for wireless mesh networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC 2009, Leipzig, Germany, June 21-24, 2009, pp. 90-95, 2009, ACM, 978-1-60558-569-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, mobility, authentication, wireless mesh networks |
41 | Junbeom Hur, Chanil Park, Young-joo Shin, Hyunsoo Yoon |
An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking. Towards Ubiquitous Networking and Services, International Conference, ICOIN 2007, Estoril, Portugal, January 23-25, 2007. Revised Selected Papers, pp. 629-638, 2007, Springer, 978-3-540-89523-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
40 | David Q. Liu, Mark Coslow |
Extensible authentication protocols for IEEE standards 802.11 and 802.16. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobility Conference ![In: Proceedings of the 5th International Conference on Mobile Technology, Applications, and Systems, Mobility Conference 2008, Yilan, Taiwan, September 10-12, 2008, pp. 47, 2008, ACM, 978-1-60558-089-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
extensible authentication protocol, wireless, IEEE 802.11, EAP |
35 | Sachin Garg, Martin Kappes, Mahalingam Mani |
Wireless access server for quality of service and location based access control in 802.11 networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 1-4 July 2002, Taormina, Italy, pp. 819-824, 2002, IEEE Computer Society, 0-7695-1671-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
34 | Martin Eian |
Fragility of the Robust Security Network: 802.11 Denial of Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings, pp. 400-416, 2009, 978-3-642-01956-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
802.11w, Security, Wireless, Denial of Service, 802.11, 802.11i |
34 | Christos Xenakis, Christoforos Ntantogian |
Security architectures for B3G mobile networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 35(3-4), pp. 123-139, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
B3G networks, EAP-SIM, EAP-AKA, WLAN, 3G, 802.11i, IKEv2 |
34 | Jon Allen, Jeff Wilson |
Securing a wireless network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 30th annual ACM SIGUCCS conference on User services: Charting Bold Courses - New Worlds in User Services, Providence, Rhode Island, USA, November 20-23, 2002, pp. 213-215, 2002, ACM, 1-58113-564-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
EAP-LEAP, EAP-MD5, EAP-TLS, EAP-TTLS, VPN, WEP, 802.11i, 802.1x |
34 | Yuteng Lu, Meng Sun 0002 |
Modeling and Verification of IEEE 802.11i Security Protocol in UPPAAL for Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Softw. Eng. Knowl. Eng. ![In: Int. J. Softw. Eng. Knowl. Eng. 28(11-12), pp. 1619-1636, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
34 | Yuteng Lu, Meng Sun 0002 |
Modeling and Verification of IEEE 802.11i Security Protocol for Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEKE ![In: The 30th International Conference on Software Engineering and Knowledge Engineering, Hotel Pullman, Redwood City, California, USA, July 1-3, 2018., pp. 270-269, 2018, KSI Research Inc. and Knowledge Systems Institute Graduate School, 1-891706-44-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
34 | Michael Gonzales, Paul Duncan, Kerssy Fermin, Roshad A. Guerrier, Abdelrahman Elleithy |
Enhancing IEEE 802.11i Standard using Quantum Cryptograp. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UEMCON ![In: 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference, UEMCON 2018, New York City, NY, USA, November 8-10, 2018, pp. 792-795, 2018, IEEE, 978-1-5386-7693-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
34 | Aymen Ghilen, Mostafa Azizi, Ridha Bouallegue |
Enhancing the Security of IEEE 802.11i Standard by Integrating a Quantum Scheme for Authentication and Encryption Key Distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 95(2), pp. 1655-1675, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
34 | Bahareh Shojaie, Iman Saberi, Mazleena Salleh |
Enhancing EAP-TLS authentication protocol for IEEE 802.11i. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 23(5), pp. 1491-1508, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
34 | R. Velayutham, D. Manimegalai |
CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE 802.11i): A Comparison with DES and RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. ![In: J. Comput. Sci. 11(2), pp. 283-290, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
34 | Rajeev Singh, Teek Parval Sharma |
On the IEEE 802.11i security: a denial-of-service perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 8(7), pp. 1378-1407, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
34 | Aymen Ghilen, Mostafa Azizi, Ridha Bouallegue |
Integration of a quantum protocol for mutual authentication and secret key distribution within 802.11i standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: 12th IEEE/ACS International Conference of Computer Systems and Applications, AICCSA 2015, Marrakech, Morocco, November 17-20, 2015, pp. 1-7, 2015, IEEE Computer Society, 978-1-5090-0478-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
34 | Andres S. Troya, Jaime J. Astudillo, Carlos G. Romero, Fabian G. Saenz, Javier Díaz |
Vulnerability detection in 802.11i wireless networks through link layer analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LATINCOM ![In: IEEE Latin-America Conference on Communications, LATINCOM 2014, Cartagena de Indias, Colombia, November 5-7, 2014, pp. 1-6, 2014, IEEE, 978-1-4799-7162-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
34 | Abdullah A. Alabdulatif, Xiaoqi Ma, Lars Nolle |
Analysing and attacking the 4-way handshake of IEEE 802.11i standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013, London, United Kingdom, December 9-12, 2013, pp. 382-387, 2013, IEEE, 978-1-908320-20-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
34 | Jaesung Park |
Secure handoff method for seamless service provisioning in infrastructure mode 802.11i system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: The International Conference on Information Networking 2013, ICOIN 2013, Bangkok, Thailand, January 28-30, 2013, pp. 664-669, 2013, IEEE Computer Society, 978-1-4673-5740-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
34 | Iman Saberi, Bahareh Shojaie, Mazleena Salleh, Mahan Niknafskermani, Mohammad Javad Rostami |
Preventing TMTO Attack in AES-CCMP in IEEE 802.11i. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CN ![In: Computer Networks - 19th International Conference, CN 2012, Szczyrk, Poland, June 19-23, 2012. Proceedings, pp. 181-190, 2012, Springer, 978-3-642-31216-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
34 | Yang Li, Jun Han 0003, Shuai Wang, Junbao Liu, Xiaoyang Zeng |
A NoC-based multi-core architecture for IEEE 802.11i CCMP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASICON ![In: 2011 IEEE 9th International Conference on ASIC, ASICON 2011, Xiamen, China, October 25-28, 2011, pp. 196-199, 2011, IEEE, 978-1-61284-192-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
34 | Ignacio Algredo-Badillo, Claudia Feregrino Uribe, René Cumplido, Miguel Morales-Sandoval |
Efficient hardware architecture for the AES-CCM protocol of the IEEE 802.11i standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 36(3), pp. 565-577, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
34 | Martin Eian |
A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings, pp. 62-75, 2010, Springer, 978-3-642-17618-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
34 | Jing Liu 0003, Xinming Ye, Jun Zhang 0001, Jun Li 0002 |
Security Verification of 802.11i 4-Way Handshake Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 1642-1647, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Jung-Ho Lee, Sung-Rok Yoon, Kwang-Eui Pyun, Sin-Chong Park |
A Multi-Processor NoC platform applied on the 802.11i TKIP cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASP-DAC ![In: Proceedings of the 13th Asia South Pacific Design Automation Conference, ASP-DAC 2008, Seoul, Korea, January 21-24, 2008, pp. 607-610, 2008, IEEE, 978-1-4244-1921-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Xinyu Xing, Elhadi M. Shakshuki, Darcy G. Benoit, Tarek R. Sheltami |
Security Analysis and Authentication Improvement for IEEE 802.11i Specification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November - 4 December 2008, pp. 1887-1891, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Sung-Hyun Eum, Sung-Jae Cho, Hyoung-Kee Choi, Hyunseung Choo |
A Robust Session Key Distribution in 802.11i. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA Workshops ![In: Selected Papers of the Sixth International Conference on Computational Sciences and Its Applications, ICCSA '08, Perugia, Italy, June 30 - July 3, 2008, pp. 201-206, 2008, IEEE Computer Society, 978-0-7695-3243-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Arshad Aziz, Nassar Ikram |
An FPGA-based AES-CCM Crypto Core For IEEE 802.11i Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 5(2), pp. 224-232, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
34 | Hung-Yu Chien, Yuan-Liang Tang, Tzu-Hang Hsu |
Secure Fast Pre-authentication Based on IEEE 802.11i. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMECS ![In: Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, IMECS 2007, March 21-23, 2007, Hong Kong, China, pp. 1325-1330, 2007, Newswood Limited, 978-988-98671-4-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
34 | Sunil K. Venugopal, Chirag Parikh, Parimal Patel |
Implementation of an IEEE 802.11i based Wireless Security System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCNCS ![In: International Conference on High Performance Computing, Networking and Communication Systems, HPCNCS-07, Orlando, Florida, USA, July 9-12 2007, pp. 136-143, 2007, ISRST, 978-0-9727412-5-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
34 | Abdul Samiah, Arshad Aziz, Nassar Ikram |
An Efficient Software Implementation of AES-CCM for IEEE 802.11i Wireless St. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: 31st Annual International Computer Software and Applications Conference, COMPSAC 2007, Beijing, China, July 24-27, 2007. Volume 2, pp. 689-694, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Alexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis |
Towards effective Wireless Intrusion Detection in IEEE 802.11i. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECPerU ![In: Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19, 2007, pp. 37-42, 2007, IEEE Computer Society, 0-7695-2863-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Floriano De Rango, Dionigi Cristian Lentini, Salvatore Marano |
Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EURASIP J. Wirel. Commun. Netw. ![In: EURASIP J. Wirel. Commun. Netw. 2006, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Thi Mai Trang Nguyen, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie |
802.11i Encryption Key Distribution Using Quantum Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Networks ![In: J. Networks 1(5), pp. 9-20, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Wei Han, Dong Zheng 0001, Kefei Chen |
Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2006, pp. 129, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
34 | Xiao Liu, Abraham O. Fapojuwo |
Formal Evaluation of Major Authentication Methods for IEEE 802.11i WLAN Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Fall ![In: Proceedings of the 64th IEEE Vehicular Technology Conference, VTC Fall 2006, 25-28 September 2006, Montréal, Québec, Canada, pp. 1-5, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Stefan Lindskog, Anna Brunström, Zoltán Faigl, Katalin Toth |
Providing Tunable Security Services: An IEEE 802.11i Example. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Second International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August 2, 2006 - September 1, 2006, pp. 1-10, 2006, IEEE, 1-4244-0423-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | N. Manivannan, P. Neelameham |
Alternative Pair-wise Key Exchange Protocols (IEEE 802.11i) in Wireless LANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWMC ![In: Proceedings of the Second International Conference on Wireless and Mobile Communications (ICWMC'06), Bucharest, Romania, July 29-31, 2006, pp. 52, 2006, IEEE Computer Society, 0-7695-2629-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Jyh-Cheng Chen, Ming-Chia Jiang, Yi-Wen Liu |
Wireless LAN security and IEEE 802.11i. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Wirel. Commun. ![In: IEEE Wirel. Commun. 12(1), pp. 27-36, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Changhua He, John C. Mitchell |
Security Analysis and Improvements for IEEE 802.11i. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2005, San Diego, California, USA, 2005, The Internet Society, 1-891562-20-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
34 | Ho Yung Jang, Joon Hyoung Shim, Jung Hee Suk, In Cheol Hwang, Jun Rim Choi |
Compatible design of CCMP and OCB AES cipher using separated encryptor and decryptor for IEEE 802.11i. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (3) ![In: Proceedings of the 2004 International Symposium on Circuits and Systems, ISCAS 2004, Vancouver, BC, Canada, May 23-26, 2004, pp. 645-648, 2004, IEEE, 0-7803-8251-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
33 | Andrew Gin, Ray Hunt |
Performance analysis of evolving wireless IEEE 802.11 security architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobility Conference ![In: Proceedings of the 5th International Conference on Mobile Technology, Applications, and Systems, Mobility Conference 2008, Yilan, Taiwan, September 10-12, 2008, pp. 101, 2008, ACM, 978-1-60558-089-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IEEE 802.1x, TKIP (temporal key integrity protocol), WiFi protected access (WPA, WPA2), performance analysis, wireless LAN, PDA (personal digital assistant), IEEE 802.11i |
30 | Jaesung Park, Beomjoon Kim, Iksoon Hwang |
Secure and Seamless Handoff Scheme for a Wireless LAN System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (1) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part I, pp. 595-604, 2006, Springer, 3-540-48269-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Ghazanfar Ali Safdar, Clare McGrath, Máire McLoone |
Limitations of existing wireless networks authentication and key management techniques for MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCN ![In: Proceedings of the International Symposium on Computer Networks, ISCN 2006, June 16-18, 2006, Istanbul, Turkey, pp. 101-105, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Mohamed Kassab, Abdelfattah Belghith, Jean-Marie Bonnin, Sahbi Sassi |
Fast and secure handoffs for 802.11 Infrastructure Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Net-Con ![In: Network Control and Engineering for QoS, Security and Mobility, IV, Fourth IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, Lannion, France, November 14-18, 2005, Proceedings, pp. 61-74, 2005, Springer, 978-0-387-49689-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Duhyun Bae, Gwanyeon Kim, Jiho Kim, Sehyun Park, Ohyoung Song |
An Efficient Design of CCMP for Robust Security Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers, pp. 352-361, 2005, Springer, 3-540-33354-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Xu Huang 0001, Dharmendra Sharma 0001 |
Multi-Agent Systems in Quantum Security for Modern Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based and Intelligent Information and Engineering Systems, 13th International Conference, KES 2009, Santiago, Chile, September 28-30, 2009, Proceedings, Part II, pp. 119-126, 2009, Springer, 978-3-642-04591-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Rafael Marín López, Ashutosh Dutta, Yoshihiro Ohba, Henning Schulzrinne, Antonio Fernandez Gómez-Skarmeta |
Network-Layer Assisted Mechanism to Optimize Authentication Delay during Handoff in 802.11 Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiQuitous ![In: 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), August 6-10, 2007, Philadelphia, PA, USA, pp. 1-8, 2007, IEEE Computer Society, 978-1-4244-1024-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Junbeom Hur, Chanil Park, Hyunsoo Yoon |
An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings, pp. 121-136, 2007, Springer, 978-3-540-75650-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
proactive key distribution, pre-authentication, IEEE 802.11 network, vehicular network, fast handoff |
25 | Andrea G. Forte, Henning Schulzrinne |
Cooperation Between Stations in Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: Proceedings of the IEEE International Conference on Network Protocols, ICNP 2007, October 16-19, 2007, Beijing, China, pp. 31-40, 2007, IEEE Computer Society, 1-4244-1588-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Elankayer Sithirasenan, Vallipuram Muthukkumarasamy |
Detecting Security Threats in Wireless LANs Using Timing and Behavioral Anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICON ![In: Proceedings of the 15th IEEE International Conference on Networks, ICON 2007, 19-21 November 2007, Adelaide, Australia, pp. 66-71, 2007, IEEE, 1-4244-1230-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Hassnaa Moustafa, Gilles Bourdon, Yvon Gourhant |
Providing Authentication and Access Control in Vehicular Network Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden, pp. 62-73, 2006, Springer, 0-387-33405-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Thi Mai Trang Nguyen, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie |
Integration of Quantum Cryptography in 802.11 Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 116-123, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Rupinder Gill, Jason Smith 0001, Andrew J. Clark |
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSW ![In: The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, January 2006, pp. 221-230, 2006, Australian Computer Society, 1-920-68236-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
session hi-jacking, wireless intrusion detection, round trip time, received signal strength, passive monitoring |
25 | Daniel B. Faria, David R. Cheriton |
Detecting identity-based attacks in wireless networks using signalprints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Wireless Security ![In: Proceedings of the 2006 ACM Workshop on Wireless Security, Los Angeles, California, USA, September 29, 2006, pp. 43-52, 2006, ACM, 1-59593-557-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
IEEE 802.11., security, wireless LANs, location-based services, denial-of-service attacks |
25 | Rainer Huber, Norbert Jordan |
An Experimental Study of a Business Domain Independent Application Level and Internet Access Authentication and Authorization Concept. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMB ![In: 2005 International Conference on Mobile Business (ICMB 2005), 11-13 July 2005, Sydney, Australia, pp. 35-41, 2005, IEEE Computer Society, 0-7695-2367-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Finn Michael Halvorsen, Olav Haugen, Martin Eian, Stig Fr. Mjølsnes |
An Improved Attack on TKIP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordSec ![In: Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings, pp. 120-132, 2009, Springer, 978-3-642-04765-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Fabio Martignon, Stefano Paris, Antonio Capone |
MobiSEC: a novel security architecture for wireless mesh networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Q2SWinet ![In: Q2SWinet'08 - Proceedings of the 4th ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Vancouver, British Columbia, Canada, October 27-28, 2008, pp. 35-42, 2008, ACM, 978-1-60558-237-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
experimental test-bed, security, authentication, wireless mesh networks |
21 | Duncan A. Grove, Toby C. Murray, Chris A. Owen, Chris J. North, J. A. Jones, Mark R. Beaumont, Bradley D. Hopkins |
An Overview of the Annex System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 23rd Annual Computer Security Applications Conference (ACSAC 2007), December 10-14, 2007, Miami Beach, Florida, USA, pp. 341-352, 2007, IEEE Computer Society, 0-7695-3060-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Jin-Cherng Lin, Yu-Hsin Kao, Chen-Wei Yang |
Secure Enhanced Wireless Transfer Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 536-543, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
IEEE 802.11 Family, SEWTP, WLAN, WEP, TKIP |
21 | René Neumerkel, Stephan Groß |
A Sophisticated Solution for Revealing Attacks on Wireless LAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust and Privacy in Digital Business, Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings, pp. 223-232, 2006, Springer, 3-540-37750-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Panu Hämäläinen, Jari Heikkinen, Marko Hännikäinen, Timo D. Hämäläinen |
Design of Transport Triggered Architecture Processors for Wireless Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSD ![In: Eighth Euromicro Symposium on Digital Systems Design (DSD 2005), 30 August - 3 September 2005, Porto, Portugal, pp. 144-152, 2005, IEEE Computer Society, 0-7695-2433-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Hassnaa Moustafa, Gilles Bourdon, Yvon Gourhant |
AAA in vehicular communication on highways with ad hoc networking support: a proposed architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Vehicular Ad Hoc Networks ![In: Proceedings of the Second International Workshop on Vehicular Ad Hoc Networks, VANET 2005, Cologne, Germany, September 2, 2005, pp. 79-80, 2005, ACM, 1-59593-141-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
inter-vehicular routing, security, ad hoc networks, AAA, vehicular communications |
21 | Fan Zhang, Jianfeng Ma 0001 |
Security Analysis on Chinese Wireless LAN Standard and Its Solution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: 34th International Conference on Parallel Processing Workshops (ICPP 2005 Workshops), 14-17 June 2005, Oslo, Norway, pp. 436-443, 2005, IEEE Computer Society, 0-7695-2381-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Emmanuel López-Trejo, Francisco Rodríguez-Henríquez, Arturo Díaz-Pérez |
An FPGA Implementation of CCM Mode Using AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers, pp. 322-334, 2005, Springer, 3-540-33354-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Thilo Pionteck, Thorsten Staake, Thomas Stiefmeier, Lukusa D. Kabulepa, Manfred Glesner |
On the design of a function-specific reconfigurable: hardware accelerator for the MAC-layer in WLANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPGA ![In: Proceedings of the ACM/SIGDA 12th International Symposium on Field Programmable Gate Arrays, FPGA 2004, Monterey, California, USA, February 22-24, 2004, pp. 258, 2004, ACM, 1-58113-829-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Jiejun Kong, Shirshanka Das, Edward Tsai, Mario Gerla |
ESCORT: a decentralized and localized access control system for mobile wireless access to secured domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Wireless Security ![In: Proceedings of the 2003 ACM Workshop on Wireless Security, San Diego, CA, USA, September 19, 2003, pp. 51-60, 2003, ACM, 1-58113-769-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
decentralized access control, identity privacy, mobile privacy, location privacy, wireless security |