|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 57 occurrences of 39 keywords
|
|
|
Results
Found 72 publication records. Showing 72 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
52 | Rodolphe Marques, André Zúquete |
Fast, secure handovers in 802.11: back to the basis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Q2SWinet ![In: Q2SWinet'08 - Proceedings of the 4th ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Vancouver, British Columbia, Canada, October 27-28, 2008, pp. 27-34, 2008, ACM, 978-1-60558-237-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
802.11 roaming, 802.1x authentication, fast reauthentication, fast handover |
42 | Steven K. Brawn, R. Mark Koan, Kelly Caye |
Staying secure in an insecure world: 802.1x secure wireless computer connectivity for students, faculty, and staff to the campus network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 32nd Annual ACM SIGUCCS Conference on User Services 2004, Baltimore, MD, USA, October 10-13, 2004, pp. 273-277, 2004, ACM, 1-58113-869-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
PEAP, dynamic WEP, wireless network, authentication, VPN, 802.1x |
41 | Purificación Sáiz, Jon Matías, Eduardo Jacob, Javier Bustamante, Armando Astarloa |
Adaptation of IEEE 802.1X for Secure Session Establishment Between Ethernet Peers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings, pp. 220-234, 2006, Springer, 3-540-68962-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Seong-Pyo Hong, Jong-An Park, Seung Jo Han, Jae-Young Pyun, Joon Lee |
Design of WLAN Secure System Against Weaknesses of the IEEE 802.1x. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICHIT ![In: Advances in Hybrid Information Technology, First International Conference, ICHIT 2006, Jeju Island, Korea, November 9-11, 2006, Revised Selected Papers, pp. 617-627, 2006, Springer, 978-3-540-77367-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
IEEE 802.1x, Privacy, Authentication, Wireless LAN Security |
25 | You Sung Kang, KyungHee Oh, Byung-Ho Chung, Kyoil Chung, DaeHun Nyang |
Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Networking Technologies for Broadband and Mobile Networks, International Conference ICOIN 2004, Busan, Korea, February 18-20, 2004, Revised Selected Papers, pp. 915-924, 2004, Springer, 3-540-23034-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
802.11i, 802.1X, WPA, WLAN security |
24 | Ju-A Lee, Jae-Hyun Kim, Jun-Hee Park, Kyung-Duk Moon |
A Secure Wireless LAN Access Technique for Home Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Spring ![In: Proceedings of the 63rd IEEE Vehicular Technology Conference, VTC Spring 2006, 7-10 May 2006, Melbourne, Australia, pp. 818-822, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Neal Leavitt |
Will IEEE 802.1X Finally Take Off in 2008? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 41(3), pp. 12-15, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, wireless networks, 802.1X |
22 | Ya-Chin Sang, Yi-Bing Lin |
Effects of the EAPOL Timers in IEEE 802.1X Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 6(6), pp. 2276-2281, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Changhua He, Mukund Sundararajan, Anupam Datta, Ante Derek, John C. Mitchell |
A modular correctness proof of IEEE 802.11i and TLS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 2-15, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
protocol composition logic, TLS, IEEE 802.11i |
15 | Jon Allen, Jeff Wilson |
Securing a wireless network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 30th annual ACM SIGUCCS conference on User services: Charting Bold Courses - New Worlds in User Services, Providence, Rhode Island, USA, November 20-23, 2002, pp. 213-215, 2002, ACM, 1-58113-564-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
EAP-LEAP, EAP-MD5, EAP-TLS, EAP-TTLS, VPN, WEP, 802.11i, 802.1x |
15 | Rodolphe Marques, Edgar Araújo, André Zúquete |
Fast 802.11 handovers with 802.1X reauthentications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 4(3), pp. 267-283, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Hareesh Khattri, Salvador Mandujano |
On the Security of 802.11 and 802.1X: Evaluating an Embedded Network Stack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of the 2007 International Conference on Security & Management, SAM 2007, Las Vegas, Nevada, USA, June 25-28, 2007, pp. 310-316, 2007, CSREA Press, 1-60132-048-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
14 | Xu Huang 0001, Shirantha Wijesekera, Dharmendra Sharma 0001 |
Novel Protocol and Its Implementation QKD in Wi-Fi Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 8th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2009, June 1-3, 2009, Shanghai, China, pp. 812-817, 2009, IEEE Computer Society, 978-0-7695-3641-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Songhe Zhao, Charles A. Shoniregun, Chris Imafidon |
Addressing the vulnerability of the 4-way handshake of 802.11i. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDIM ![In: Third IEEE International Conference on Digital Information Management (ICDIM), November 13-16, 2008, London, UK, Proceedings, pp. 351-356, 2008, IEEE, 978-1-4244-2917-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Elankayer Sithirasenan, Saad Zafar, Vallipuram Muthukkumarasamy |
Formal Verification of the IEEE 802.11i WLAN Security Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASWEC ![In: 17th Australian Software Engineering Conference (ASWEC 2006), 18-21 April 2006, Sydney, Australia, pp. 181-190, 2006, IEEE Computer Society, 0-7695-2551-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Jaesung Park, Beomjoon Kim, Iksoon Hwang |
Secure and Seamless Handoff Scheme for a Wireless LAN System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (1) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part I, pp. 595-604, 2006, Springer, 3-540-48269-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Debabrata Nayak, Deepak B. Phatak, Ved Prakash Gulati |
Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings, pp. 25-35, 2005, Springer, 3-540-25584-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Chia Hsing Tung, Yi Quan Chen, Zhi Mou Chen, Shuoh-Ren Tsai |
Implementation of Security Mechanism for Adhoc Wireless Networks Based on X.509 and IEEE 802.1X. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SUTC (1) ![In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006), 5-7 June 2006, Taichung, Taiwan, pp. 562-563, 2006, IEEE Computer Society, 0-7695-2553-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Arun Saha, Mart L. Molle |
Thinking Outside the Box: Extending 802.1x Authentication to Remote "Splitter" Ports by Combining Physical and Data Link Layer Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), The Conference on Leading Edge and Practical Computer Networking, 20-24 October 2003, Bonn/Königswinter, Germany, Proceedings, pp. 324-333, 2003, IEEE Computer Society, 0-7695-2037-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Iván Vidal, Francisco Valera, Jaime García-Reinoso, Arturo Azcorra, Vitor Pinto, Vítor Ribeiro |
QoS and Authentication Experiences in a Residential Environment Within a Broadband Access Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWIC ![In: Wired/Wireless Internet Communications, 5th International Conference, WWIC 2007, Coimbra, Portugal, May 23-25, 2007, Proceedings, pp. 91-102, 2007, Springer, 978-3-540-72694-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
RGW, triple play, trials, QoS, broadband, 802.1X |
10 | Georgios Kambourakis, Stefanos Gritzalis |
On Device Authentication in Wireless Networks: Present Issues and Future Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings, pp. 135-144, 2007, Springer, 978-3-540-74408-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Device authentication, Wireless security, 802.1X, TCG |
10 | Douglas E. Ennis |
The wireless tightrope: an economical, secure, and user friendly approach for the wireless campus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 33rd Annual ACM SIGUCCS Conference on User Services 2005, Monterey, CA, USA, November 6-9, 2005, pp. 62-67, 2005, ACM, 1-59593-200-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
EAP-TLS, MSCHAPv2, PEAP, SSL certificates, SWAN, WLCCP, WEP, 802.1X |
9 | Ding Tang, Cheng Wan 0004, Zhijun Zhao |
A New Design of AAA Client for Integrated Access Based on Embedded Linux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (2) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 2: Software Engineering, December 12-14, 2008, Wuhan, China, pp. 155-159, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Hyung-Woo Lee |
Secure Authentication and Accounting Mechanism on WLAN with Interaction of Mobile Message Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (6) ![In: Universal Access in Human-Computer Interaction. Ambient Interaction, 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007 Held as Part of HCI International 2007 Beijing, China, July 22-27, 2007 Proceedings, Part II, pp. 122-131, 2007, Springer, 978-3-540-73280-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Elankayer Sithirasenan, Vallipuram Muthukkumarasamy |
Detecting Security Threats in Wireless LANs Using Timing and Behavioral Anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICON ![In: Proceedings of the 15th IEEE International Conference on Networks, ICON 2007, 19-21 November 2007, Adelaide, Australia, pp. 66-71, 2007, IEEE, 1-4244-1230-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
9 | André Zúquete, Hugo Marques |
A Security Architecture for Protecting LAN Interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 311-326, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Fernando C. Colón Osorio, Emmanuel Agu, Kerry McKay |
Measuring energy-security tradeoffs in wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 24th IEEE International Performance Computing and Communications Conference, IPCCC 2005, April 7-9, 2005, Phoenix, Arizona, USA, pp. 293-302, 2005, IEEE, 0-7803-8991-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Aftab Ahmad, Mona El-Kadi, Stephan Olariu |
Common data security network (CDSN). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Q2SWinet ![In: Q2SWinet'05 - Proceedings of the First ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Montreal, Quebec, Canada, October 13, 2005, pp. 1-7, 2005, ACM, 1-59593-241-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
common data security, security plane, wireless LANs, security architecture, IEEE 802.11i, TKIP |
9 | Rainer Huber, Norbert Jordan |
An Experimental Study of a Business Domain Independent Application Level and Internet Access Authentication and Authorization Concept. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMB ![In: 2005 International Conference on Mobile Business (ICMB 2005), 11-13 July 2005, Sydney, Australia, pp. 35-41, 2005, IEEE Computer Society, 0-7695-2367-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Mohamed Ali Kâafar, Lamia Ben Azzouz, Farouk Kamoun, Davor Males |
A Kerberos-Based Authentication Architecture for Wireless LANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2004, Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication, Third International IFIP-TC6 Networking Conference, Athens, Greece, May 9-14, 2004, Proceedings, pp. 1344-1353, 2004, Springer, 3-540-21959-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Joseph W. Graham II |
Authenticating public access networking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 30th annual ACM SIGUCCS conference on User services: Charting Bold Courses - New Worlds in User Services, Providence, Rhode Island, USA, November 20-23, 2002, pp. 247-248, 2002, ACM, 1-58113-564-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
NDS, PPPoE, authentication, networking, wireless, LDAP, Kerberos, directory, DHCP, active directory |
9 | Daniel B. Faria, David R. Cheriton |
DoS and authentication in wireless public access networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Wireless Security ![In: Proceedings of the 2002 ACM Workshop on Wireless Security, Atlanta, GA, USA, September 28, 2002, pp. 47-56, 2002, ACM, 1-58113-585-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
security, wireless networks, DoS |
9 | David Geer |
Whatever Happened to Network-Access-Control Technology? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 43(9), pp. 13-16, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
NAC, IEEE 802.1X, NAC frameworks, policy decision points, NAC interoperability, RADIUS, network access control |
9 | Andrew Gin, Ray Hunt |
Performance analysis of evolving wireless IEEE 802.11 security architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobility Conference ![In: Proceedings of the 5th International Conference on Mobile Technology, Applications, and Systems, Mobility Conference 2008, Yilan, Taiwan, September 10-12, 2008, pp. 101, 2008, ACM, 978-1-60558-089-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IEEE 802.1x, TKIP (temporal key integrity protocol), WiFi protected access (WPA, WPA2), performance analysis, wireless LAN, PDA (personal digital assistant), IEEE 802.11i |
8 | Frederik Hauser, Marco Häberle, Michael Menth |
P4sec: Automated Deployment of 802.1X, IPsec, and MACsec Network Protection in P4-Based SDN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 56300-56309, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
8 | Igor Virgílio Araújo, Solange Rito Lima, André Domingos Brízido |
IEEE 802.1X Virtual Network Function Development for NG-PON Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SoftCOM ![In: 30th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2022, Split, Croatia, September 22-24, 2022, pp. 1-6, 2022, IEEE, 978-953-290-117-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
8 | Maxim Kovtsur, Andrey Minyaev, Dmitrii Khramtsov, Georgii Abramenko |
Investigation of Attacks and Methods of Protection of Wireless Networks During Authorization Using the IEEE 802.1x Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICFNDS ![In: ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems, Dubai United Arab Emirates, December 15 - 16, 2021, pp. 555-561, 2021, ACM, 978-1-4503-8734-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
8 | Nuno Marques, André Zúquete, João Paulo Barraca |
EAP-SH: An EAP Authentication Protocol to Integrate Captive Portals in the 802.1X Security Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 113(4), pp. 1891-1915, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
8 | George Hallak, Tobias Frauenrath, Anil Mengi |
Security Concepts Based on IEEE 802.1X for G.hn Broadband PLC Access Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPLC ![In: 2020 IEEE International Symposium on Power Line Communications and its Applications, ISPLC 2020, Málaga, Spain, May 11-13, 2020, pp. 1-6, 2020, IEEE, 978-1-7281-4816-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
8 | Nuno Marques, André Zúquete, João Paulo Barraca |
Integration of the Captive Portal paradigm with the 802.1X architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1908.09927, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
8 | Farrukh Chughtai, Riaz ul Amin, Abdul Sattar Malik, Nausheen Saeed |
Performance analysis of microsoft network policy server and freeRADIUS authentication systems in 802.1x based secured wired ethernet using PEAP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. Arab J. Inf. Technol. ![In: Int. Arab J. Inf. Technol. 16(5), pp. 862-870, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
8 | Mukhammad Andri Setiawan |
How 802.1x Enhances Knowledge Extraction from Large Scale Campus WiFi Deployment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KMIS ![In: Proceedings of the 11th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, IC3K 2019, Volume 3: KMIS, Vienna, Austria, September 17-19, 2019., pp. 391-397, 2019, ScitePress, 978-989-758-382-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
8 | Biswanath Dey, S. S. Vishnu, Om Satyam Swarnkar |
An efficient dynamic key based EAP authentication framework for future IEEE 802.1x Wireless LANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDSP ![In: Proceedings of the 2nd International Conference on Digital Signal Processing, ICDSP 2018, Tokyo, Japan, February 25-27, 2018, pp. 125-131, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
8 | Frederik Hauser, Mark Schmidt 0002, Michael Menth |
Establishing a session database for SDN using 802.1X and multiple authentication resources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: IEEE International Conference on Communications, ICC 2017, Paris, France, May 21-25, 2017, pp. 1-7, 2017, IEEE, 978-1-4673-8999-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
8 | Edivaldo C. de A. Junior, Edson A. M. Avelar, Kelvin L. Dias, Paulo R. F. Cunha |
Mobility-Flow: Solução para Handover Transparente e com Suporte à Autenticação 802.1x em Redes OpenFlow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SBRC ![In: XXXV Brazilian Symposium on Computer Networks and Distributed Systems, SBRC 2017, Belém, Brazil, May 15-19, 2018, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
8 | Kamal Benzekki, Abdeslam El Fergougui, Abdelbaki El Alaoui El Belrhiti |
Devolving IEEE 802.1X authentication capability to data plane in software-defined networking (SDN) architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 9(17), pp. 4369-4377, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
8 | Hanying Chen, Xiao-Li Liu |
An Enhanced Identity Authentication Security Access Control Model Based on 802.1x Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSDM ![In: Fuzzy Systems and Data Mining II - Proceedings of FSDM 2016 [Macau, China, 1-14 December 2016], pp. 407-413, 2016, IOS Press, 978-1-61499-721-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
8 | Berardino Carnevale, Francesco Falaschi, Diego Pacini, Gianluca Dini, Luca Fanucci |
A hardware accelerator for the IEEE 802.1X-2010 key hierarchy in automotive applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: 12th IEEE/ACS International Conference of Computer Systems and Applications, AICCSA 2015, Marrakech, Morocco, November 17-20, 2015, pp. 1-6, 2015, IEEE Computer Society, 978-1-5090-0478-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
8 | Toshiki Watanabe, Shunichi Kinoshita, Yasuhiro Yamasaki, Hideaki Goto, Hideaki Sone |
Flexible Access and Priority Control System Based on 802.1X Authentication in Time of Disaster. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC Workshops ![In: IEEE 37th Annual Computer Software and Applications Conference, COMPSAC Workshops 2013, Kyoto, Japan, July 22-26, 2013, pp. 385-390, 2013, IEEE Computer Society, 978-1-4799-2159-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
8 | Abdulrahman Alruban, Emlyn Everitt |
Two Novel 802.1x Denial of Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EISIC ![In: European Intelligence and Security Informatics Conference, EISIC 2011, Athens, Greece, September 12-14, 2011, pp. 183-190, 2011, IEEE Computer Soecity, 978-1-4577-1464-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
8 | Xiaodong Zhang 0001, Yumei Zhao, Yan Ma |
The Research and Realization of IEEE 802.1X and Account. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCID (2) ![In: 2009 Second International Symposium on Computational Intelligence and Design, ISCID 2009, Changsha, Hunan, China, 12-14 December 2009, 2 Volumes, pp. 334-337, 2009, IEEE Computer Society, 978-0-7695-3865-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
8 | Romano Fantacci, Leonardo Maccari, Tommaso Pecorella, Federico Frosali |
Analysis of secure handover for IEEE 802.1x-based wireless ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Wirel. Commun. ![In: IEEE Wirel. Commun. 14(5), pp. 21-29, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
8 | Kuang-Hui Chi, Ji-Han Jiang, Li-Hsing Yen |
Cost-Effective Caching for Mobility Support in IEEE 802.1X Frameworks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 5(11), pp. 1547-1560, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
independent reference model, Robust Security Network, cache, Wireless Local Area Network, fast handoff |
8 | Leonardo Maccari, Romano Fantacci, Tommaso Pecorella, Federico Frosali |
Secure, fast handhoff techniques for 802.1X based wireless network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2006, Istanbul, Turkey, 11-15 June 2006, pp. 3917-3922, 2006, IEEE, 1-4244-0355-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
8 | Jyh-Cheng Chen, Yu-Ping Wang |
Extensible authentication protocol (EAP) and IEEE 802.1x: tutorial and empirical experience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Mag. ![In: IEEE Commun. Mag. 43(12), pp. 26-supl, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
8 | Artur Hecker, Houda Labiod |
An efficient micromobility implementation for 802.1X WLANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PIMRC ![In: Proceedings of the IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2004, 5-8 September 2004, Barcelona, Spain, pp. 2684-2688, 2004, IEEE. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
8 | Artur Hecker, Houda Labiod |
Pre-authenticated signaling in wireless LANs using 802.1X access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November - 3 December 2004, pp. 2180-2184, 2004, IEEE, 0-7803-8794-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
8 | Ping Ding, JoAnne Holliday, Aslihan Celik |
Improving the security of wireless LANs by managing 802.1x disassociation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCNC ![In: 1st IEEE Consumer Communications and Networking Conference, CCNC 2004, Las Vegas, NV, USA, January 5-8, 2004, pp. 53-58, 2004, IEEE, 0-7803-8145-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
8 | Paul Congdon, Bernard Aboba, Andrew Smith, Glen Zorn, John Roese |
IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 3580, pp. 1-30, September 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
8 | Pekka Nikander |
Authorization and Charging in Public WLANs Using FreeBSD and 802.1x. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Annual Technical Conference, FREENIX Track ![In: Proceedings of the FREENIX Track: 2002 USENIX Annual Technical Conference, June 10-15, 2002, Monterey, California, USA, pp. 109-119, 2002, USENIX, 1-880446-01-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
8 | Sangheon Pack, Yanghee Choi |
Pre-Authenticated Fast Handoff in a Public Wireless LAN Based on IEEE 802.1x Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PWC ![In: Mobile and Wireless Communications, IFIP TC6/WG6.8 Working Conference on Personal Wireless Communications (PWC'2002), October 23-25, 2002, Singapore, pp. 175-182, 2002, Kluwer, 1-4020-7250-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
5 | Zhenyu Wang, Xiangdong Li, Lining Yao, Qi Feng, Ruimin Wang |
Research on Endpoint Isolation and Remediation Mechanism Based on Trusted Access Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC (2) ![In: 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 17-20, 2008, Volume II: Workshops, pp. 89-93, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
5 | Manuel Sánchez, Gabriel López Millán, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta |
Bootstrapping a Global SSO from Network Access Control Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 170-180, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
authorization, federation, SSO, SAML |
5 | Jongho Ryu |
EAP Using the Split Password-Based Authenticated Key Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers, pp. 364-380, 2006, Springer, 978-3-540-71092-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
5 | Dong Phil Kim, Seok Joo Koh, Sang Wook Kim |
An Integrated Scheme for Intrusion Detection in WLAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Advances in Data Communications and Wireless Networks, International Conference, ICOIN 2006, Sendai, Japan, January 16-19, 2006, Revised Selected Papers, pp. 723-732, 2006, Springer, 3-540-48563-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
5 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers, pp. 767-777, 2006, Springer, 978-3-540-74376-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
5 | Gabriel López 0001, Antonio Fernandez Gómez-Skarmeta, Rafael Marín López, Óscar Cánovas Reverte |
A Network Access Control Approach Based on the AAA Architecture and Authorization Attributes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), CD-ROM / Abstracts Proceedings, 4-8 April 2005, Denver, CO, USA, 2005, IEEE Computer Society, 0-7695-2312-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
5 | Yusong Lin, Binqiang Wang, Zongmin Wang |
MixCast: A New Group Communication Model in Large-Scale Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 28-30 March 2005, Taipei, Taiwan, pp. 307-310, 2005, IEEE Computer Society, 0-7695-2249-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
5 | Wen-Ting Wu, Jyh-Cheng Chen, Kai-Hsiu Chen, Kuo-Pao Fan |
Design and implementation of WIRE Diameter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITRE ![In: ITRE 2005 - 3rd International Conference on Information Technology: Research and Education, June 27-30 2005, Hsinchu, Taiwan, Proceedings, pp. 428-433, 2005, IEEE, 0-7803-8933-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
5 | Il-Gon Kim, Jin-Young Choi |
Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 264-269, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
5 | Jong-hu Lee, Jae-Cheol Ryou 0001 |
Strong User Authentication in IEEE802.11 Wireless LAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Human.Society@Internet 2003 ![In: Web Communication Technologies and Internet-Related Social Issues - HSI 2003, Second International Conference on Human Society@Internet, Seoul, Korea, June 18-20, 2003, Proceedings, pp. 638-643, 2003, Springer, 3-540-40456-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
5 | Su Jung Yu, Joo-Seok Song |
An Improved Password Authentication Key Exchange Protocol for 802.11 Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2003, International Conference, Montreal, Canada, May 18-21, 2003, Proceedings, Part II, pp. 201-209, 2003, Springer, 3-540-40161-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #72 of 72 (100 per page; Change: )
|
|