The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase 802.1X (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2002-2004 (16) 2005-2006 (22) 2007-2009 (16) 2010-2020 (15) 2021-2023 (3)
Publication types (Num. hits)
article(13) inproceedings(59)
Venues (Conferences, Journals, ...)
SIGUCCS(4) Computer(2) ICC(2) ICOIN(2) Q2SWinet(2) Secur. Commun. Networks(2) ACIS-ICIS(1) AICCSA(1) AINA(1) AINA (2)(1) ASWEC(1) CCNC(1) CCS(1) CIS(1) COMPSAC Workshops(1) CoRR(1) More (+10 of total 64)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 57 occurrences of 39 keywords

Results
Found 72 publication records. Showing 72 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
52Rodolphe Marques, André Zúquete Fast, secure handovers in 802.11: back to the basis. Search on Bibsonomy Q2SWinet The full citation details ... 2008 DBLP  DOI  BibTeX  RDF 802.11 roaming, 802.1x authentication, fast reauthentication, fast handover
42Steven K. Brawn, R. Mark Koan, Kelly Caye Staying secure in an insecure world: 802.1x secure wireless computer connectivity for students, faculty, and staff to the campus network. Search on Bibsonomy SIGUCCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF PEAP, dynamic WEP, wireless network, authentication, VPN, 802.1x
41Purificación Sáiz, Jon Matías, Eduardo Jacob, Javier Bustamante, Armando Astarloa Adaptation of IEEE 802.1X for Secure Session Establishment Between Ethernet Peers. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Seong-Pyo Hong, Jong-An Park, Seung Jo Han, Jae-Young Pyun, Joon Lee Design of WLAN Secure System Against Weaknesses of the IEEE 802.1x. Search on Bibsonomy ICHIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IEEE 802.1x, Privacy, Authentication, Wireless LAN Security
25You Sung Kang, KyungHee Oh, Byung-Ho Chung, Kyoil Chung, DaeHun Nyang Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism. Search on Bibsonomy ICOIN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF 802.11i, 802.1X, WPA, WLAN security
24Ju-A Lee, Jae-Hyun Kim, Jun-Hee Park, Kyung-Duk Moon A Secure Wireless LAN Access Technique for Home Network. Search on Bibsonomy VTC Spring The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Neal Leavitt Will IEEE 802.1X Finally Take Off in 2008? Search on Bibsonomy Computer The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, wireless networks, 802.1X
22Ya-Chin Sang, Yi-Bing Lin Effects of the EAPOL Timers in IEEE 802.1X Authentication. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Changhua He, Mukund Sundararajan, Anupam Datta, Ante Derek, John C. Mitchell A modular correctness proof of IEEE 802.11i and TLS. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF protocol composition logic, TLS, IEEE 802.11i
15Jon Allen, Jeff Wilson Securing a wireless network. Search on Bibsonomy SIGUCCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF EAP-LEAP, EAP-MD5, EAP-TLS, EAP-TTLS, VPN, WEP, 802.11i, 802.1x
15Rodolphe Marques, Edgar Araújo, André Zúquete Fast 802.11 handovers with 802.1X reauthentications. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Hareesh Khattri, Salvador Mandujano On the Security of 802.11 and 802.1X: Evaluating an Embedded Network Stack. Search on Bibsonomy Security and Management The full citation details ... 2007 DBLP  BibTeX  RDF
14Xu Huang 0001, Shirantha Wijesekera, Dharmendra Sharma 0001 Novel Protocol and Its Implementation QKD in Wi-Fi Networks. Search on Bibsonomy ACIS-ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Songhe Zhao, Charles A. Shoniregun, Chris Imafidon Addressing the vulnerability of the 4-way handshake of 802.11i. Search on Bibsonomy ICDIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Elankayer Sithirasenan, Saad Zafar, Vallipuram Muthukkumarasamy Formal Verification of the IEEE 802.11i WLAN Security Protocol. Search on Bibsonomy ASWEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Jaesung Park, Beomjoon Kim, Iksoon Hwang Secure and Seamless Handoff Scheme for a Wireless LAN System. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Debabrata Nayak, Deepak B. Phatak, Ved Prakash Gulati Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Chia Hsing Tung, Yi Quan Chen, Zhi Mou Chen, Shuoh-Ren Tsai Implementation of Security Mechanism for Adhoc Wireless Networks Based on X.509 and IEEE 802.1X. Search on Bibsonomy SUTC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Arun Saha, Mart L. Molle Thinking Outside the Box: Extending 802.1x Authentication to Remote "Splitter" Ports by Combining Physical and Data Link Layer Techniques. Search on Bibsonomy LCN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
10Iván Vidal, Francisco Valera, Jaime García-Reinoso, Arturo Azcorra, Vitor Pinto, Vítor Ribeiro QoS and Authentication Experiences in a Residential Environment Within a Broadband Access Framework. Search on Bibsonomy WWIC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RGW, triple play, trials, QoS, broadband, 802.1X
10Georgios Kambourakis, Stefanos Gritzalis On Device Authentication in Wireless Networks: Present Issues and Future Challenges. Search on Bibsonomy TrustBus The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Device authentication, Wireless security, 802.1X, TCG
10Douglas E. Ennis The wireless tightrope: an economical, secure, and user friendly approach for the wireless campus. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF EAP-TLS, MSCHAPv2, PEAP, SSL certificates, SWAN, WLCCP, WEP, 802.1X
9Ding Tang, Cheng Wan 0004, Zhijun Zhao A New Design of AAA Client for Integrated Access Based on Embedded Linux. Search on Bibsonomy CSSE (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Hyung-Woo Lee Secure Authentication and Accounting Mechanism on WLAN with Interaction of Mobile Message Service. Search on Bibsonomy HCI (6) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Elankayer Sithirasenan, Vallipuram Muthukkumarasamy Detecting Security Threats in Wireless LANs Using Timing and Behavioral Anomalies. Search on Bibsonomy ICON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9André Zúquete, Hugo Marques A Security Architecture for Protecting LAN Interactions. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Fernando C. Colón Osorio, Emmanuel Agu, Kerry McKay Measuring energy-security tradeoffs in wireless networks. Search on Bibsonomy IPCCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Aftab Ahmad, Mona El-Kadi, Stephan Olariu Common data security network (CDSN). Search on Bibsonomy Q2SWinet The full citation details ... 2005 DBLP  DOI  BibTeX  RDF common data security, security plane, wireless LANs, security architecture, IEEE 802.11i, TKIP
9Rainer Huber, Norbert Jordan An Experimental Study of a Business Domain Independent Application Level and Internet Access Authentication and Authorization Concept. Search on Bibsonomy ICMB The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Mohamed Ali Kâafar, Lamia Ben Azzouz, Farouk Kamoun, Davor Males A Kerberos-Based Authentication Architecture for Wireless LANs. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Joseph W. Graham II Authenticating public access networking. Search on Bibsonomy SIGUCCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF NDS, PPPoE, authentication, networking, wireless, LDAP, Kerberos, directory, DHCP, active directory
9Daniel B. Faria, David R. Cheriton DoS and authentication in wireless public access networks. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2002 DBLP  DOI  BibTeX  RDF security, wireless networks, DoS
9David Geer Whatever Happened to Network-Access-Control Technology? Search on Bibsonomy Computer The full citation details ... 2010 DBLP  DOI  BibTeX  RDF NAC, IEEE 802.1X, NAC frameworks, policy decision points, NAC interoperability, RADIUS, network access control
9Andrew Gin, Ray Hunt Performance analysis of evolving wireless IEEE 802.11 security architectures. Search on Bibsonomy Mobility Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IEEE 802.1x, TKIP (temporal key integrity protocol), WiFi protected access (WPA, WPA2), performance analysis, wireless LAN, PDA (personal digital assistant), IEEE 802.11i
8Frederik Hauser, Marco Häberle, Michael Menth P4sec: Automated Deployment of 802.1X, IPsec, and MACsec Network Protection in P4-Based SDN. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
8Igor Virgílio Araújo, Solange Rito Lima, André Domingos Brízido IEEE 802.1X Virtual Network Function Development for NG-PON Architecture. Search on Bibsonomy SoftCOM The full citation details ... 2022 DBLP  BibTeX  RDF
8Maxim Kovtsur, Andrey Minyaev, Dmitrii Khramtsov, Georgii Abramenko Investigation of Attacks and Methods of Protection of Wireless Networks During Authorization Using the IEEE 802.1x Protocol. Search on Bibsonomy ICFNDS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
8Nuno Marques, André Zúquete, João Paulo Barraca EAP-SH: An EAP Authentication Protocol to Integrate Captive Portals in the 802.1X Security Architecture. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
8George Hallak, Tobias Frauenrath, Anil Mengi Security Concepts Based on IEEE 802.1X for G.hn Broadband PLC Access Networks. Search on Bibsonomy ISPLC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
8Nuno Marques, André Zúquete, João Paulo Barraca Integration of the Captive Portal paradigm with the 802.1X architecture. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
8Farrukh Chughtai, Riaz ul Amin, Abdul Sattar Malik, Nausheen Saeed Performance analysis of microsoft network policy server and freeRADIUS authentication systems in 802.1x based secured wired ethernet using PEAP. Search on Bibsonomy Int. Arab J. Inf. Technol. The full citation details ... 2019 DBLP  BibTeX  RDF
8Mukhammad Andri Setiawan How 802.1x Enhances Knowledge Extraction from Large Scale Campus WiFi Deployment. Search on Bibsonomy KMIS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
8Biswanath Dey, S. S. Vishnu, Om Satyam Swarnkar An efficient dynamic key based EAP authentication framework for future IEEE 802.1x Wireless LANs. Search on Bibsonomy ICDSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
8Frederik Hauser, Mark Schmidt 0002, Michael Menth Establishing a session database for SDN using 802.1X and multiple authentication resources. Search on Bibsonomy ICC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
8Edivaldo C. de A. Junior, Edson A. M. Avelar, Kelvin L. Dias, Paulo R. F. Cunha Mobility-Flow: Solução para Handover Transparente e com Suporte à Autenticação 802.1x em Redes OpenFlow. Search on Bibsonomy SBRC The full citation details ... 2017 DBLP  BibTeX  RDF
8Kamal Benzekki, Abdeslam El Fergougui, Abdelbaki El Alaoui El Belrhiti Devolving IEEE 802.1X authentication capability to data plane in software-defined networking (SDN) architecture. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
8Hanying Chen, Xiao-Li Liu An Enhanced Identity Authentication Security Access Control Model Based on 802.1x Protocol. Search on Bibsonomy FSDM The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
8Berardino Carnevale, Francesco Falaschi, Diego Pacini, Gianluca Dini, Luca Fanucci A hardware accelerator for the IEEE 802.1X-2010 key hierarchy in automotive applications. Search on Bibsonomy AICCSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
8Toshiki Watanabe, Shunichi Kinoshita, Yasuhiro Yamasaki, Hideaki Goto, Hideaki Sone Flexible Access and Priority Control System Based on 802.1X Authentication in Time of Disaster. Search on Bibsonomy COMPSAC Workshops The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
8Abdulrahman Alruban, Emlyn Everitt Two Novel 802.1x Denial of Service Attacks. Search on Bibsonomy EISIC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
8Xiaodong Zhang 0001, Yumei Zhao, Yan Ma The Research and Realization of IEEE 802.1X and Account. Search on Bibsonomy ISCID (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Romano Fantacci, Leonardo Maccari, Tommaso Pecorella, Federico Frosali Analysis of secure handover for IEEE 802.1x-based wireless ad hoc networks. Search on Bibsonomy IEEE Wirel. Commun. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
8Kuang-Hui Chi, Ji-Han Jiang, Li-Hsing Yen Cost-Effective Caching for Mobility Support in IEEE 802.1X Frameworks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF independent reference model, Robust Security Network, cache, Wireless Local Area Network, fast handoff
8Leonardo Maccari, Romano Fantacci, Tommaso Pecorella, Federico Frosali Secure, fast handhoff techniques for 802.1X based wireless network. Search on Bibsonomy ICC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
8Jyh-Cheng Chen, Yu-Ping Wang Extensible authentication protocol (EAP) and IEEE 802.1x: tutorial and empirical experience. Search on Bibsonomy IEEE Commun. Mag. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
8Artur Hecker, Houda Labiod An efficient micromobility implementation for 802.1X WLANs. Search on Bibsonomy PIMRC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
8Artur Hecker, Houda Labiod Pre-authenticated signaling in wireless LANs using 802.1X access control. Search on Bibsonomy GLOBECOM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
8Ping Ding, JoAnne Holliday, Aslihan Celik Improving the security of wireless LANs by managing 802.1x disassociation. Search on Bibsonomy CCNC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
8Paul Congdon, Bernard Aboba, Andrew Smith, Glen Zorn, John Roese IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines. Search on Bibsonomy RFC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
8Pekka Nikander Authorization and Charging in Public WLANs Using FreeBSD and 802.1x. Search on Bibsonomy USENIX Annual Technical Conference, FREENIX Track The full citation details ... 2002 DBLP  BibTeX  RDF
8Sangheon Pack, Yanghee Choi Pre-Authenticated Fast Handoff in a Public Wireless LAN Based on IEEE 802.1x Model. Search on Bibsonomy PWC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
5Zhenyu Wang, Xiangdong Li, Lining Yao, Qi Feng, Ruimin Wang Research on Endpoint Isolation and Remediation Mechanism Based on Trusted Access Technology. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
5Manuel Sánchez, Gabriel López Millán, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta Bootstrapping a Global SSO from Network Access Control Mechanisms. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authorization, federation, SSO, SAML
5Jongho Ryu EAP Using the Split Password-Based Authenticated Key Agreement. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
5Dong Phil Kim, Seok Joo Koh, Sang Wook Kim An Integrated Scheme for Intrusion Detection in WLAN. Search on Bibsonomy ICOIN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
5SeongHan Shin, Kazukuni Kobara, Hideki Imai An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
5Gabriel López 0001, Antonio Fernandez Gómez-Skarmeta, Rafael Marín López, Óscar Cánovas Reverte A Network Access Control Approach Based on the AAA Architecture and Authorization Attributes. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
5Yusong Lin, Binqiang Wang, Zongmin Wang MixCast: A New Group Communication Model in Large-Scale Network. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
5Wen-Ting Wu, Jyh-Cheng Chen, Kai-Hsiu Chen, Kuo-Pao Fan Design and implementation of WIRE Diameter. Search on Bibsonomy ITRE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
5Il-Gon Kim, Jin-Young Choi Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking. Search on Bibsonomy AINA (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
5Jong-hu Lee, Jae-Cheol Ryou 0001 Strong User Authentication in IEEE802.11 Wireless LAN. Search on Bibsonomy Human.Society@Internet 2003 The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
5Su Jung Yu, Joo-Seok Song An Improved Password Authentication Key Exchange Protocol for 802.11 Environment. Search on Bibsonomy ICCSA (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #72 of 72 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license