Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
133 | Changhua He, Mukund Sundararajan, Anupam Datta, Ante Derek, John C. Mitchell |
A modular correctness proof of IEEE 802.11i and TLS.  |
CCS  |
2005 |
DBLP DOI BibTeX RDF |
protocol composition logic, TLS, IEEE 802.11i |
130 | Aidil Izani Jafri, Yean Li Ho |
ANonce encryption in 802.11i 4-way handshake protocol.  |
MoMM  |
2009 |
DBLP DOI BibTeX RDF |
4-way handshake protocol, ANonce, 802.11i, DoS attack, WLAN security |
121 | Alexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis |
On RSN-Oriented Wireless Intrusion Detection.  |
OTM Conferences (2)  |
2007 |
DBLP DOI BibTeX RDF |
Robust Security Network, Intrusion Detection, 802.11i |
102 | Jörg Rech |
Wireless LANs - 802.11-WLAN-Technologie und praktische Umsetzung im Detail: 802.11a/h: 802.11b: 802.11g: 802.11i: 802.11n: 802.11d: 802.11e: 802.11f: 802.11s (3. Aufl.).  |
|
2008 |
RDF |
|
101 | Hareesh Khattri, Rajendra S. Katti |
Implementation and performance analysis of IEEE 802.11i standard using the IXP425 network processor.  |
PE-WASUN  |
2005 |
DBLP DOI BibTeX RDF |
|
96 | Zeeshan Furqan, Shahabuddin Muhammad, Ratan K. Guha |
Formal Verification of 802.11i using Strand Space Formalism.  |
ICN/ICONS/MCL  |
2006 |
DBLP DOI BibTeX RDF |
|
94 | Duhyun Bae, Jiho Kim, Sehyun Park, Ohyoung Song |
Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN.  |
CISC  |
2005 |
DBLP DOI BibTeX RDF |
|
93 | Changhua He, John C. Mitchell |
Analysis of the 802.11i 4-way handshake.  |
Workshop on Wireless Security  |
2004 |
DBLP DOI BibTeX RDF |
4-way handshake, authentication, WLAN, key management, denial-of-service, 802.11i |
89 | Guido R. Hiertz, Sebastian Max, Rui Zhao, Dee Denteneer, Lars Berlemann |
Principles of IEEE 802.11s.  |
ICCCN  |
2007 |
DBLP DOI BibTeX RDF |
|
85 | Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole Bai, Dong Xuan |
Link-layer protection in 802.11i WLANS with dummy authentication.  |
WISEC  |
2009 |
DBLP DOI BibTeX RDF |
dummy authentication, security, wlan, open access |
81 | Purificación Sáiz, Jon Matías, Eduardo Jacob, Javier Bustamante, Armando Astarloa |
Adaptation of IEEE 802.1X for Secure Session Establishment Between Ethernet Peers.  |
ICISS  |
2006 |
DBLP DOI BibTeX RDF |
|
80 | You Sung Kang, KyungHee Oh, Byung-Ho Chung, Kyoil Chung, DaeHun Nyang |
Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism.  |
ICOIN  |
2004 |
DBLP DOI BibTeX RDF |
802.11i, 802.1X, WPA, WLAN security |
80 | Songhe Zhao, Charles A. Shoniregun, Chris Imafidon |
Addressing the vulnerability of the 4-way handshake of 802.11i.  |
ICDIM  |
2008 |
DBLP DOI BibTeX RDF |
|
80 | Elankayer Sithirasenan, Saad Zafar, Vallipuram Muthukkumarasamy |
Formal Verification of the IEEE 802.11i WLAN Security Protocol.  |
ASWEC  |
2006 |
DBLP DOI BibTeX RDF |
|
79 | Duhyun Bae, Gwanyeon Kim, Jiho Kim, Sehyun Park, Ohyoung Song |
Design and Implementation of Efficient Cipher Engine for IEEE 802.11i Compatible with IEEE 802.11n and IEEE 802.11e.  |
CIS (2)  |
2005 |
DBLP DOI BibTeX RDF |
|
74 | Mansoor Ahmed Khan, Ahmad Raza Cheema, Aamir Hasan 0001 |
Improved Nonce Construction Scheme for AES CCMP to Evade Initial Counter Prediction.  |
SNPD  |
2008 |
DBLP DOI BibTeX RDF |
AES CCMP, Initial Counter, Key Length, TMTO, Integrity, Encryption, Confidentiality, Nonce, IEEE 802.11i |
71 | Ju-A Lee, Jae-Hyun Kim, Jun-Hee Park, Kyung-Duk Moon |
A Secure Wireless LAN Access Technique for Home Network.  |
VTC Spring  |
2006 |
DBLP DOI BibTeX RDF |
|
67 | M. Razvi Doomun, K. M. S. Soyjaudah |
Adaptive IEEE 802.11i Security for Energy-Security Optimization.  |
AICT  |
2007 |
DBLP DOI BibTeX RDF |
energy-efficient, Wireless, adaptive security, IEEE 802.11i |
65 | Sangeetha L. Bangolae, Carol Bell, Emily Qi |
Performance study of fast BSS transition using IEEE 802.11r.  |
IWCMC  |
2006 |
DBLP DOI BibTeX RDF |
IEEE 802.11r standard, fast BSS transition, fast roaming, performance, wireless LAN |
59 | Shirantha Wijesekera, Xu Huang 0001, Dharmendra Sharma 0001 |
Multi-Agent Based Approach for Quantum Key Distribution in WiFi Networks.  |
KES-AMSTA  |
2009 |
DBLP DOI BibTeX RDF |
Quantum Key Distribution (QKD), MAS, WiFi, 802.11i |
58 | Rodolphe Marques, André Zúquete |
Fast, secure handovers in 802.11: back to the basis.  |
Q2SWinet  |
2008 |
DBLP DOI BibTeX RDF |
802.11 roaming, 802.1x authentication, fast reauthentication, fast handover |
58 | Aftab Ahmad, Mona El-Kadi, Stephan Olariu |
Common data security network (CDSN).  |
Q2SWinet  |
2005 |
DBLP DOI BibTeX RDF |
common data security, security plane, wireless LANs, security architecture, IEEE 802.11i, TKIP |
58 | Mohamed Kassab, Abdelfattah Belghith, Jean-Marie Bonnin, Sahbi Sassi |
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks.  |
WMuNeP  |
2005 |
DBLP DOI BibTeX RDF |
IAPP, pre-authentication, re-authentication, handover, WiFi, IEEE 802.11i |
55 | Gulsum Zeynep Gurkas Aydin, Abdül Halim Zaim, M. Ali Aydin |
Security Mechanisms And Their Performance Impacts On Wireless Local Area Networks.  |
ISCN  |
2006 |
DBLP DOI BibTeX RDF |
|
55 | Ulrike Meyer, Jared Cordasco, Susanne Wetzel |
An approach to enhance inter-provider roaming through secret sharing and its application to WLANs.  |
WMASH  |
2005 |
DBLP DOI BibTeX RDF |
EAP-TLS-KS, distributed DSS, inter-provider roaming, micropayment scheme, WLAN, secret sharing, PKI, 802.11i |
54 | Jianyong Huang, Jennifer Seberry, Willy Susilo, Martin W. Bunder |
Security Analysis of Michael: The IEEE 802.11i Message Integrity Code.  |
EUC Workshops  |
2005 |
DBLP DOI BibTeX RDF |
|
54 | Fan Zhang, Jianfeng Ma 0001, Sang-Jae Moon |
The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11i.  |
CIS (2)  |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Avishai Wool |
A note on the fragility of the "Michael" message integrity code.  |
IEEE Trans. Wirel. Commun.  |
2004 |
DBLP DOI BibTeX RDF |
|
41 | Georg Lukas, Christian Fackroth |
WMNSec: security for wireless mesh networks.  |
IWCMC  |
2009 |
DBLP DOI BibTeX RDF |
security, mobility, authentication, wireless mesh networks |
41 | Junbeom Hur, Chanil Park, Young-joo Shin, Hyunsoo Yoon |
An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks.  |
ICOIN  |
2007 |
DBLP DOI BibTeX RDF |
|
40 | David Q. Liu, Mark Coslow |
Extensible authentication protocols for IEEE standards 802.11 and 802.16.  |
Mobility Conference  |
2008 |
DBLP DOI BibTeX RDF |
extensible authentication protocol, wireless, IEEE 802.11, EAP |
35 | Sachin Garg, Martin Kappes, Mahalingam Mani |
Wireless access server for quality of service and location based access control in 802.11 networks.  |
ISCC  |
2002 |
DBLP DOI BibTeX RDF |
|
34 | Martin Eian |
Fragility of the Robust Security Network: 802.11 Denial of Service.  |
ACNS  |
2009 |
DBLP DOI BibTeX RDF |
802.11w, Security, Wireless, Denial of Service, 802.11, 802.11i |
34 | Christos Xenakis, Christoforos Ntantogian |
Security architectures for B3G mobile networks.  |
Telecommun. Syst.  |
2007 |
DBLP DOI BibTeX RDF |
B3G networks, EAP-SIM, EAP-AKA, WLAN, 3G, 802.11i, IKEv2 |
34 | Jon Allen, Jeff Wilson |
Securing a wireless network.  |
SIGUCCS  |
2002 |
DBLP DOI BibTeX RDF |
EAP-LEAP, EAP-MD5, EAP-TLS, EAP-TTLS, VPN, WEP, 802.11i, 802.1x |
34 | Yuteng Lu, Meng Sun 0002 |
Modeling and Verification of IEEE 802.11i Security Protocol in UPPAAL for Internet of Things.  |
Int. J. Softw. Eng. Knowl. Eng.  |
2018 |
DBLP DOI BibTeX RDF |
|
34 | Yuteng Lu, Meng Sun 0002 |
Modeling and Verification of IEEE 802.11i Security Protocol for Internet of Things.  |
SEKE  |
2018 |
DBLP DOI BibTeX RDF |
|
34 | Michael Gonzales, Paul Duncan, Kerssy Fermin, Roshad A. Guerrier, Abdelrahman Elleithy |
Enhancing IEEE 802.11i Standard using Quantum Cryptograp.  |
UEMCON  |
2018 |
DBLP DOI BibTeX RDF |
|
34 | Aymen Ghilen, Mostafa Azizi, Ridha Bouallegue |
Enhancing the Security of IEEE 802.11i Standard by Integrating a Quantum Scheme for Authentication and Encryption Key Distribution.  |
Wirel. Pers. Commun.  |
2017 |
DBLP DOI BibTeX RDF |
|
34 | Bahareh Shojaie, Iman Saberi, Mazleena Salleh |
Enhancing EAP-TLS authentication protocol for IEEE 802.11i.  |
Wirel. Networks  |
2017 |
DBLP DOI BibTeX RDF |
|
34 | R. Velayutham, D. Manimegalai |
CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE 802.11i): A Comparison with DES and RSA.  |
J. Comput. Sci.  |
2015 |
DBLP DOI BibTeX RDF |
|
34 | Rajeev Singh, Teek Parval Sharma |
On the IEEE 802.11i security: a denial-of-service perspective.  |
Secur. Commun. Networks  |
2015 |
DBLP DOI BibTeX RDF |
|
34 | Aymen Ghilen, Mostafa Azizi, Ridha Bouallegue |
Integration of a quantum protocol for mutual authentication and secret key distribution within 802.11i standard.  |
AICCSA  |
2015 |
DBLP DOI BibTeX RDF |
|
34 | Andres S. Troya, Jaime J. Astudillo, Carlos G. Romero, Fabian G. Saenz, Javier Díaz |
Vulnerability detection in 802.11i wireless networks through link layer analysis.  |
LATINCOM  |
2014 |
DBLP DOI BibTeX RDF |
|
34 | Abdullah A. Alabdulatif, Xiaoqi Ma, Lars Nolle |
Analysing and attacking the 4-way handshake of IEEE 802.11i standard.  |
ICITST  |
2013 |
DBLP DOI BibTeX RDF |
|
34 | Jaesung Park |
Secure handoff method for seamless service provisioning in infrastructure mode 802.11i system.  |
ICOIN  |
2013 |
DBLP DOI BibTeX RDF |
|
34 | Iman Saberi, Bahareh Shojaie, Mazleena Salleh, Mahan Niknafskermani, Mohammad Javad Rostami |
Preventing TMTO Attack in AES-CCMP in IEEE 802.11i.  |
CN  |
2012 |
DBLP DOI BibTeX RDF |
|
34 | Yang Li, Jun Han 0003, Shuai Wang, Junbao Liu, Xiaoyang Zeng |
A NoC-based multi-core architecture for IEEE 802.11i CCMP.  |
ASICON  |
2011 |
DBLP DOI BibTeX RDF |
|
34 | Ignacio Algredo-Badillo, Claudia Feregrino Uribe, René Cumplido, Miguel Morales-Sandoval |
Efficient hardware architecture for the AES-CCM protocol of the IEEE 802.11i standard.  |
Comput. Electr. Eng.  |
2010 |
DBLP DOI BibTeX RDF |
|
34 | Martin Eian |
A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP.  |
CANS  |
2010 |
DBLP DOI BibTeX RDF |
|
34 | Jing Liu 0003, Xinming Ye, Jun Zhang 0001, Jun Li 0002 |
Security Verification of 802.11i 4-Way Handshake Protocol.  |
ICC  |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Jung-Ho Lee, Sung-Rok Yoon, Kwang-Eui Pyun, Sin-Chong Park |
A Multi-Processor NoC platform applied on the 802.11i TKIP cryptosystem.  |
ASP-DAC  |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Xinyu Xing, Elhadi M. Shakshuki, Darcy G. Benoit, Tarek R. Sheltami |
Security Analysis and Authentication Improvement for IEEE 802.11i Specification.  |
GLOBECOM  |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Sung-Hyun Eum, Sung-Jae Cho, Hyoung-Kee Choi, Hyunseung Choo |
A Robust Session Key Distribution in 802.11i.  |
ICCSA Workshops  |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Arshad Aziz, Nassar Ikram |
An FPGA-based AES-CCM Crypto Core For IEEE 802.11i Architecture.  |
Int. J. Netw. Secur.  |
2007 |
DBLP BibTeX RDF |
|
34 | Hung-Yu Chien, Yuan-Liang Tang, Tzu-Hang Hsu |
Secure Fast Pre-authentication Based on IEEE 802.11i.  |
IMECS  |
2007 |
DBLP BibTeX RDF |
|
34 | Sunil K. Venugopal, Chirag Parikh, Parimal Patel |
Implementation of an IEEE 802.11i based Wireless Security System.  |
HPCNCS  |
2007 |
DBLP BibTeX RDF |
|
34 | Abdul Samiah, Arshad Aziz, Nassar Ikram |
An Efficient Software Implementation of AES-CCM for IEEE 802.11i Wireless St.  |
COMPSAC (2)  |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Alexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis |
Towards effective Wireless Intrusion Detection in IEEE 802.11i.  |
SECPerU  |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Floriano De Rango, Dionigi Cristian Lentini, Salvatore Marano |
Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i.  |
EURASIP J. Wirel. Commun. Netw.  |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Thi Mai Trang Nguyen, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie |
802.11i Encryption Key Distribution Using Quantum Cryptography.  |
J. Networks  |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Wei Han, Dong Zheng 0001, Kefei Chen |
Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i.  |
IACR Cryptol. ePrint Arch.  |
2006 |
DBLP BibTeX RDF |
|
34 | Xiao Liu, Abraham O. Fapojuwo |
Formal Evaluation of Major Authentication Methods for IEEE 802.11i WLAN Standard.  |
VTC Fall  |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Stefan Lindskog, Anna Brunström, Zoltán Faigl, Katalin Toth |
Providing Tunable Security Services: An IEEE 802.11i Example.  |
SecureComm  |
2006 |
DBLP DOI BibTeX RDF |
|
34 | N. Manivannan, P. Neelameham |
Alternative Pair-wise Key Exchange Protocols (IEEE 802.11i) in Wireless LANs.  |
ICWMC  |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Jyh-Cheng Chen, Ming-Chia Jiang, Yi-Wen Liu |
Wireless LAN security and IEEE 802.11i.  |
IEEE Wirel. Commun.  |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Changhua He, John C. Mitchell |
Security Analysis and Improvements for IEEE 802.11i.  |
NDSS  |
2005 |
DBLP BibTeX RDF |
|
34 | Ho Yung Jang, Joon Hyoung Shim, Jung Hee Suk, In Cheol Hwang, Jun Rim Choi |
Compatible design of CCMP and OCB AES cipher using separated encryptor and decryptor for IEEE 802.11i.  |
ISCAS (3)  |
2004 |
DBLP BibTeX RDF |
|
33 | Andrew Gin, Ray Hunt |
Performance analysis of evolving wireless IEEE 802.11 security architectures.  |
Mobility Conference  |
2008 |
DBLP DOI BibTeX RDF |
IEEE 802.1x, TKIP (temporal key integrity protocol), WiFi protected access (WPA, WPA2), performance analysis, wireless LAN, PDA (personal digital assistant), IEEE 802.11i |
30 | Jaesung Park, Beomjoon Kim, Iksoon Hwang |
Secure and Seamless Handoff Scheme for a Wireless LAN System.  |
OTM Workshops (1)  |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Ghazanfar Ali Safdar, Clare McGrath, Máire McLoone |
Limitations of existing wireless networks authentication and key management techniques for MANETs.  |
ISCN  |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Mohamed Kassab, Abdelfattah Belghith, Jean-Marie Bonnin, Sahbi Sassi |
Fast and secure handoffs for 802.11 Infrastructure Networks.  |
Net-Con  |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Duhyun Bae, Gwanyeon Kim, Jiho Kim, Sehyun Park, Ohyoung Song |
An Efficient Design of CCMP for Robust Security Network.  |
ICISC  |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Xu Huang 0001, Dharmendra Sharma 0001 |
Multi-Agent Systems in Quantum Security for Modern Wireless Networks.  |
KES (2)  |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Rafael Marín López, Ashutosh Dutta, Yoshihiro Ohba, Henning Schulzrinne, Antonio Fernandez Gómez-Skarmeta |
Network-Layer Assisted Mechanism to Optimize Authentication Delay during Handoff in 802.11 Networks.  |
MobiQuitous  |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Junbeom Hur, Chanil Park, Hyunsoo Yoon |
An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks.  |
IWSEC  |
2007 |
DBLP DOI BibTeX RDF |
proactive key distribution, pre-authentication, IEEE 802.11 network, vehicular network, fast handoff |
25 | Andrea G. Forte, Henning Schulzrinne |
Cooperation Between Stations in Wireless Networks.  |
ICNP  |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Elankayer Sithirasenan, Vallipuram Muthukkumarasamy |
Detecting Security Threats in Wireless LANs Using Timing and Behavioral Anomalies.  |
ICON  |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Hassnaa Moustafa, Gilles Bourdon, Yvon Gourhant |
Providing Authentication and Access Control in Vehicular Network Environment.  |
SEC  |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Thi Mai Trang Nguyen, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie |
Integration of Quantum Cryptography in 802.11 Networks.  |
ARES  |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Rupinder Gill, Jason Smith 0001, Andrew J. Clark |
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks.  |
ACSW  |
2006 |
DBLP BibTeX RDF |
session hi-jacking, wireless intrusion detection, round trip time, received signal strength, passive monitoring |
25 | Daniel B. Faria, David R. Cheriton |
Detecting identity-based attacks in wireless networks using signalprints.  |
Workshop on Wireless Security  |
2006 |
DBLP DOI BibTeX RDF |
IEEE 802.11., security, wireless LANs, location-based services, denial-of-service attacks |
25 | Rainer Huber, Norbert Jordan |
An Experimental Study of a Business Domain Independent Application Level and Internet Access Authentication and Authorization Concept.  |
ICMB  |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Finn Michael Halvorsen, Olav Haugen, Martin Eian, Stig Fr. Mjølsnes |
An Improved Attack on TKIP.  |
NordSec  |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Fabio Martignon, Stefano Paris, Antonio Capone |
MobiSEC: a novel security architecture for wireless mesh networks.  |
Q2SWinet  |
2008 |
DBLP DOI BibTeX RDF |
experimental test-bed, security, authentication, wireless mesh networks |
21 | Duncan A. Grove, Toby C. Murray, Chris A. Owen, Chris J. North, J. A. Jones, Mark R. Beaumont, Bradley D. Hopkins |
An Overview of the Annex System.  |
ACSAC  |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Jin-Cherng Lin, Yu-Hsin Kao, Chen-Wei Yang |
Secure Enhanced Wireless Transfer Protocol.  |
ARES  |
2006 |
DBLP DOI BibTeX RDF |
IEEE 802.11 Family, SEWTP, WLAN, WEP, TKIP |
21 | René Neumerkel, Stephan Groß |
A Sophisticated Solution for Revealing Attacks on Wireless LAN.  |
TrustBus  |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Panu Hämäläinen, Jari Heikkinen, Marko Hännikäinen, Timo D. Hämäläinen |
Design of Transport Triggered Architecture Processors for Wireless Encryption.  |
DSD  |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Hassnaa Moustafa, Gilles Bourdon, Yvon Gourhant |
AAA in vehicular communication on highways with ad hoc networking support: a proposed architecture.  |
Vehicular Ad Hoc Networks  |
2005 |
DBLP DOI BibTeX RDF |
inter-vehicular routing, security, ad hoc networks, AAA, vehicular communications |
21 | Fan Zhang, Jianfeng Ma 0001 |
Security Analysis on Chinese Wireless LAN Standard and Its Solution.  |
ICPP Workshops  |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Emmanuel López-Trejo, Francisco Rodríguez-Henríquez, Arturo Díaz-Pérez |
An FPGA Implementation of CCM Mode Using AES.  |
ICISC  |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Thilo Pionteck, Thorsten Staake, Thomas Stiefmeier, Lukusa D. Kabulepa, Manfred Glesner |
On the design of a function-specific reconfigurable: hardware accelerator for the MAC-layer in WLANs.  |
FPGA  |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Jiejun Kong, Shirshanka Das, Edward Tsai, Mario Gerla |
ESCORT: a decentralized and localized access control system for mobile wireless access to secured domains.  |
Workshop on Wireless Security  |
2003 |
DBLP DOI BibTeX RDF |
decentralized access control, identity privacy, mobile privacy, location privacy, wireless security |