Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
141 | Soundararajan Chandramathi, K. V. Arunkumar, S. Deivarayan, P. Sendhilkumar |
Fuzzy based dynamic WEP keymanagement for WLAN security enhancement.  |
COMSWARE  |
2008 |
DBLP DOI BibTeX RDF |
|
92 | Andrea Bittau, Mark Handley, Joshua Lackey |
The Final Nail in WEP's Coffin.  |
S&P  |
2006 |
DBLP DOI BibTeX RDF |
|
91 | Kevin Richardson, John A. Hamilton Jr., Martin C. Carlisle |
A performance analysis of the spring protocol through simulation.  |
SpringSim (3)  |
2007 |
DBLP BibTeX RDF |
SPRiNG, network simulation, wireless security, OPNET, WEP |
75 | Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin |
Breaking 104 Bit WEP in Less Than 60 Seconds.  |
WISA  |
2007 |
DBLP DOI BibTeX RDF |
|
75 | Adam Stubblefield, John Ioannidis, Aviel D. Rubin |
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP).  |
ACM Trans. Inf. Syst. Secur.  |
2004 |
DBLP DOI BibTeX RDF |
wired equivalent privacy, Wireless security |
67 | Erik Tews, Martin Beck |
Practical attacks against WEP and WPA.  |
WISEC  |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, 802.11, rc4, wep, wlan, wpa, tkip |
67 | Mohammad Saleh, Iyad Al Khatib |
Performance of Secure Ad Hoc Sensor Networks Utilizing IEEE802.11b WEP.  |
Systems Communications  |
2005 |
DBLP DOI BibTeX RDF |
IEEE802.11b, security, sensor networks, performance, Ad hoc, WEP |
59 | Songhe Zhao, Charles A. Shoniregun |
Critical Review of Unsecured WEP.  |
IEEE SCW  |
2007 |
DBLP DOI BibTeX RDF |
|
59 | Toshihiro Ohigashi, Yoshiaki Shiraishi, Masakatu Morii |
FMS Attack-Resistant WEP Implementation Is Still Broken.  |
CIS (2)  |
2005 |
DBLP DOI BibTeX RDF |
|
58 | Serge Vaudenay, Martin Vuagnoux |
Passive-Only Key Recovery Attacks on RC4.  |
Selected Areas in Cryptography  |
2007 |
DBLP DOI BibTeX RDF |
key related attack, cryptanalysis, stream cipher, RC4, WEP |
58 | Jin-Cherng Lin, Yu-Hsin Kao, Chen-Wei Yang |
Secure Enhanced Wireless Transfer Protocol.  |
ARES  |
2006 |
DBLP DOI BibTeX RDF |
IEEE 802.11 Family, SEWTP, WLAN, WEP, TKIP |
57 | Wen-Chuan Hsieh, Chi-Chun Lo, Jing-Chi Lee, Li-Tsung Huang |
The Implementation of a Proactive Wireless Intrusion Detection System.  |
CIT  |
2004 |
DBLP DOI BibTeX RDF |
Wireless Intrusion Detection System (WIDS), Wired Equivalent Privacy (WEP), 802.11, Short Message Service (SMS), Wireless Local Area Network (WLAN) |
49 | Avishai Wool |
A note on the fragility of the "Michael" message integrity code.  |
IEEE Trans. Wirel. Commun.  |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Itsik Mantin |
A Practical Attack on the Fixed RC4 in the WEP Mode.  |
ASIACRYPT  |
2005 |
DBLP DOI BibTeX RDF |
Related IV attacks, Cryptanalysis, Stream ciphers, Side-channel attacks, Fault analysis, RC4, Related key attacks |
42 | Chi Hyung In, Choong Seon Hong, Il Gyu Song |
A Scheme for Improving WEP Key Transmission between APs in Wireless Environment.  |
ICCSA (1)  |
2004 |
DBLP DOI BibTeX RDF |
|
41 | Douglas E. Ennis |
The wireless tightrope: an economical, secure, and user friendly approach for the wireless campus.  |
SIGUCCS  |
2005 |
DBLP DOI BibTeX RDF |
EAP-TLS, MSCHAPv2, PEAP, SSL certificates, SWAN, WLCCP, WEP, 802.1X |
41 | Jon Allen, Jeff Wilson |
Securing a wireless network.  |
SIGUCCS  |
2002 |
DBLP DOI BibTeX RDF |
EAP-LEAP, EAP-MD5, EAP-TLS, EAP-TTLS, VPN, WEP, 802.11i, 802.1x |
33 | Shaneel Narayan, Samad S. Kolahi, Yonathan Sunarto, Du D. T. Nguyen, Paul Mani |
The Influence of Wireless 802.11g LAN Encryption Methods on Throughput and Round Trip Time for Various Windows Operating Systems.  |
CNSR  |
2008 |
DBLP DOI BibTeX RDF |
Windows operating system, performance, wireless, throughput, encryption, response time |
33 | Samad S. Kolahi, Shaneel Narayan, Du D. T. Nguyen, Yonathan Sunarto, Paul Mani |
The impact of wireless LAN security on performance of different Windows operating systems.  |
ISCC  |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Gulsum Zeynep Gurkas Aydin, Abdül Halim Zaim, M. Ali Aydin |
Security Mechanisms And Their Performance Impacts On Wireless Local Area Networks.  |
ISCN  |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Sabine Kebreau, Barbu Constantinescu, Samuel Pierre |
A New Security Approach for WLAN.  |
CCECE  |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Avishai Wool |
Lightweight Key Management for IEEE 802.11 Wireless LANs with Key Refresh and Host Revocation.  |
Wirel. Networks  |
2005 |
DBLP DOI BibTeX RDF |
security, authentication |
33 | Duhyun Bae, Jiho Kim, Sehyun Park, Ohyoung Song |
Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN.  |
CISC  |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Emmanuel López-Trejo, Francisco Rodríguez-Henríquez, Arturo Díaz-Pérez |
An FPGA Implementation of CCM Mode Using AES.  |
ICISC  |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Ahmad M. Kholaif, Magda B. Fayek, Hussein Sherif Eissa, Hoda Baraka |
DRKH: A Power Efficient Encryption Protocol forWireless Devices.  |
LCN  |
2005 |
DBLP DOI BibTeX RDF |
Power Devices, Dynamic Re-keying, Key Hopping, Authentication, WLAN Security |
33 | Nikita Borisov, Ian Goldberg, David A. Wagner 0001 |
Intercepting mobile communications: the insecurity of 802.11.  |
MobiCom  |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Ren-Zun Lian, Xing-Yue Guo |
Work-Energy Principle (WEP)-Based Characteristic Mode Theory for Wireless Power Transfer Systems.  |
ICCCS  |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Zhengqiao Lu |
基于混沌和WEP的无线传感器网络加密研究 (Encryption of Wireless Sensor Networks Based on Chaos and WEP).  |
计算机科学  |
2019 |
DBLP BibTeX RDF |
|
26 | José A. R. Pacheco de Carvalho, Hugo Veiga, Claudia F. F. P. Ribeiro Pacheco, Antonio D. Reis |
Performance Evaluation of IEEE 802.11a 54 Mbps WEP Multi-Node Laboratory Links.  |
CSNDSP  |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Yuhei Watanabe, Takahiro Iriyama, Masakatu Morii |
Proposal of WEP Operation with Strong IV and Its Implementation.  |
J. Inf. Process.  |
2017 |
DBLP DOI BibTeX RDF |
|
26 | José A. R. Pacheco de Carvalho, Hugo Veiga, Claudia F. F. P. Ribeiro Pacheco, Antonio D. Reis |
Laboratory performance measurements of IEEE 802.11 a WEP PTMP links.  |
CSNDSP  |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Masafumi Yamada, Tetsuya Oda, Yi Liu 0011, Masahiro Hiyama, Keita Matsuo, Leonard Barolli |
Performance Evaluation of an IoT-based e-Learning Testbed Considering OLSR and WEP Protocols.  |
IMIS  |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Cerstin Mahlow |
C-WEP―Rich Annotated Collection of Writing Errors by Professionals.  |
LREC  |
2016 |
DBLP BibTeX RDF |
|
26 | Pouyan Sepehrdad, Petr Susil, Serge Vaudenay, Martin Vuagnoux |
Tornado Attack on RC4 with Applications to WEP & WPA.  |
IACR Cryptol. ePrint Arch.  |
2015 |
DBLP BibTeX RDF |
|
26 | Mattia D'Antonio, Paolo D'Onorio De Meo, Daniele Paoletti, Berardino Elmi, Matteo Pallocca, Nico Sanna, Ernesto Picardi, Graziano Pesole, Tiziana Castrignanò |
WEP: a high-performance analysis pipeline for whole-exome data.  |
BMC Bioinform.  |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Rafik Chaabouni |
Break WEP Faster with Statistical Analysis.  |
IACR Cryptol. ePrint Arch.  |
2013 |
DBLP BibTeX RDF |
|
26 | Pouyan Sepehrdad, Petr Susil, Serge Vaudenay, Martin Vuagnoux |
Smashing WEP in a Passive Attack.  |
FSE  |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Md. Golam Rashed, M. Hasnat Kabir, Shaikh Enayet Ullah |
WEP: An Energy Efficient Protocol for Cluster Based Heterogeneous Wireless Sensor Network  |
CoRR  |
2012 |
DBLP BibTeX RDF |
|
26 | T. Tsukaune, Yosuke Todo, Masakatu Morii |
Proposal of a Secure WEP Operation against Existing Key Recovery Attacks and its Evaluation.  |
AsiaJCIS  |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Masakatu Morii, Yosuke Todo |
Cryptanalysis for RC4 and Breaking WEP/WPA-TKIP.  |
IEICE Trans. Inf. Syst.  |
2011 |
DBLP DOI BibTeX RDF |
|
26 | José A. R. Pacheco de Carvalho, Hugo Veiga, Nuno Marques, C. F. Ribeiro Pacheco, Antonio D. Reis |
TCP, UDP and FTP Performances of Laboratory Wi-Fi IEEE 802.11g WEP Point-to-Point Links.  |
CENTERIS (2)  |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Ryoichi Teramura, Yasuo Asakura, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii |
Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets.  |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.  |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Mustafa ElGili, Samani A. Talab, Awad H. Ali |
WEP and WPA Improvement.  |
Wirel. Sens. Netw.  |
2010 |
DBLP DOI BibTeX RDF |
|
26 | José A. R. Pacheco de Carvalho, Hugo Veiga, Nuno Marques, Claudia F. F. P. Ribeiro Pacheco, Antonio D. Reis |
A contribution to laboratory performance measurements of IEEE 802.11 a/g WEP point-to-point links using TCP, UDP and FTP.  |
CSNDSP  |
2010 |
DBLP DOI BibTeX RDF |
|
26 | José A. R. Pacheco de Carvalho, Hugo Veiga, Nuno Marques, C. F. Ribeiro Pacheco, Antonio D. Reis |
A Contribution to Laboratory Performance Measurements of IEEE 802.11 B, G WEP Point-to-Point Links.  |
WINSYS  |
2010 |
DBLP BibTeX RDF |
|
26 | Saif ur Rehman, Saeed Ullah, Sardar Ali |
On enhancing the WEP security against brute-force and compromised keys.  |
CISIM  |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Taskin Koçak, Mohit Jagetia |
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation.  |
Comput. Commun.  |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Kazukuni Kobara, Hideki Imai |
IVs to Skip for Immunizing WEP against FMS Attack.  |
IEICE Trans. Commun.  |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Soundararajan Chandramathi, K. V. Arunkumar, S. Deivarayan, P. Sendhilkumar, K. Vaithiyanathan |
Modified WEP key management for enhancing WLAN security.  |
Int. J. Inf. Commun. Technol.  |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Martin Beck, Erik Tews |
Practical attacks against WEP and WPA.  |
IACR Cryptol. ePrint Arch.  |
2008 |
DBLP BibTeX RDF |
|
26 | Halil-Ibrahim Bulbul, Ihsan Batmaz, Mesut Ozel |
Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols.  |
e-Forensics  |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Bogdan Crainicu, Florian Mircea Boian |
KSAm - An Improved RC4 Key-Scheduling Algorithm for Securing WEP.  |
TeNe  |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Longjun Zhang, Tao Zou |
An Improved Key Management Scheme for WEP.  |
EUC (2)  |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Erik Tews |
Attacks on the WEP protocol.  |
IACR Cryptol. ePrint Arch.  |
2007 |
DBLP BibTeX RDF |
|
26 | Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin |
Breaking 104 bit WEP in less than 60 seconds.  |
IACR Cryptol. ePrint Arch.  |
2007 |
DBLP BibTeX RDF |
|
26 | Therverson Kanavathy |
Security Flaws in WEP Data Encryption Standard.  |
ICWN  |
2007 |
DBLP BibTeX RDF |
|
26 | Kevin Curran, Elaine Smyth |
Demonstrating the Wired Equivalent Privacy (WEP) Weaknesses Inherent in Wi-Fi Networks.  |
Inf. Secur. J. A Glob. Perspect.  |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Radomir Prodanovic, Dejan Simic |
Holistic approach to Wep protocol in securing wireless network infrastructure.  |
Comput. Sci. Inf. Syst.  |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Kazukuni Kobara, Hideki Imai |
Key-Dependent Weak IVs and Weak Keys in WEP - How to Trace Conditions Back to Their Patterns - .  |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.  |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Ramzi A. Haraty, Walid El Horr |
A hybrid cryptosystem based on WEP for 802.11 networks.  |
J. Comput. Methods Sci. Eng.  |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Jin-Cherng Lin, Yu-Hsin Kao |
Burglarproof WEP Protocol on Wireless Infrastructure.  |
PACIS  |
2006 |
DBLP BibTeX RDF |
|
26 | Ramzi A. Haraty, Walid El Horr |
Securing wireless networks with enhanced WEP.  |
CAINE  |
2006 |
DBLP BibTeX RDF |
|
26 | Darshan Purandare, Ratan K. Guha, Joohan Lee |
An IV Collision Avoidance Algorithm - Strengthening the WEP.  |
ICWN  |
2005 |
DBLP BibTeX RDF |
|
26 | Darshan Purandare, Ratan K. Guha |
Enhancing Message Privacy in WEP.  |
Wireless Information Systems  |
2005 |
DBLP BibTeX RDF |
|
26 | Wen-Chuan Hsieh, Yi-Hsien Chiu, Chi-Chun Lo |
An Interference-Based Prevention Mechanism Against WEP Attack for 802.11B Network.  |
Net-Con  |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Arnulfo Ochoa Indart, Jesús Arturo Pérez Díaz |
Analysis of WEP Performance on Mobile Devices.  |
WOSIS  |
2004 |
DBLP BibTeX RDF |
|
26 | Giannis Pikrammenos, Ghassan Sarkis, John Soldatos 0001, Vasilios Anagnostopoulos |
Hidden Layer Authentication using Smart Card for WEP-based WLANS.  |
SEC  |
2003 |
DBLP BibTeX RDF |
|
26 | Adam Stubblefield, John Ioannidis, Aviel D. Rubin |
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP.  |
NDSS  |
2002 |
DBLP BibTeX RDF |
|
26 | Panu Hämäläinen, Marko Hännikäinen, Timo Hämäläinen 0001, Jukka Saarinen |
Hardware implementation of the improved WEP and RC4 encryption algorithms for wireless terminals.  |
EUSIPCO  |
2000 |
DBLP BibTeX RDF |
|
26 | Dimitris Christodoulakis, Grammati E. Pantziou |
WEP - a workstation for education in programming.  |
J. Syst. Softw.  |
1988 |
DBLP DOI BibTeX RDF |
|
26 | M. Devos, Geert Adriaens, Yves D. Willems |
The Parallel Expert Parser (PEP): a thoroughly revised descendent of the Word Expert Parser (WEP).  |
COLING  |
1988 |
DBLP BibTeX RDF |
|
26 | Geert Adriaens |
WEP (Word Expert Parsing) Revised and Applied to Dutch.  |
ECAI  |
1986 |
DBLP BibTeX RDF |
|
25 | Subhasis Mukherjee, Maynul Hasan, Belal Chowdhury, Morshed U. Chowdhury |
Security of RFID Systems - A Hybrid Approach.  |
SNPD  |
2011 |
DBLP DOI BibTeX RDF |
IV, RFID, RSA, SCM, WEP |
25 | Gh. Rasool Begh, Ajaz Hussain Mir |
Quantification of the Effect of Security on Performance in Wireless LANs.  |
SECURWARE  |
2009 |
DBLP DOI BibTeX RDF |
Wireless LAN, TCP, Packet Loss, UDP, WEP, WPA |
25 | Carsten Maple, Helen Jacobs, Matthew Reeve |
Choosing the Right Wireless LAN Security Protocol for the Home and Business User.  |
ARES  |
2006 |
DBLP DOI BibTeX RDF |
security, WLANs, WEP, WPA, TKIP |
25 | Shih Tsung Liang, Ming-Yi Weng |
Protecting IEEE 802.11 Wireless LANs against the FCS False Blocking Attack.  |
ICPADS (1)  |
2005 |
DBLP DOI BibTeX RDF |
false blocking attack, FCS false blocking detection and recovery, WLAN, IEEE 802.11, WEP |
25 | Pascal Meunier, Sofie Nystrom, Seny Kamara, Scott Yost, Kyle Alexander, Dan Noland, Jared Crane |
ActiveSync, TCP/IP and 802.11b Wireless Vulnerabilities of WinCE-Based PDAs.  |
WETICE  |
2002 |
DBLP DOI BibTeX RDF |
WinCE, ActiveSync, security, wireless, vulnerability, WEP, 802.11b |
24 | Steven K. Brawn, R. Mark Koan, Kelly Caye |
Staying secure in an insecure world: 802.1x secure wireless computer connectivity for students, faculty, and staff to the campus network.  |
SIGUCCS  |
2004 |
DBLP DOI BibTeX RDF |
PEAP, dynamic WEP, wireless network, authentication, VPN, 802.1x |
16 | Jie Xiong 0001, Kyle Jamieson |
SecureAngle: improving wireless security using angle-of-arrival information (poster abstract).  |
SIGCOMM  |
2010 |
DBLP DOI BibTeX RDF |
SecureAngle, wireless, 802.11, angle of arrival |
16 | Bo Yan, Guanling Chen, Jie Wang 0002, Hongda Yin |
Robust Detection of Unauthorized Wireless Access Points.  |
Mob. Networks Appl.  |
2009 |
DBLP DOI BibTeX RDF |
intrusion detection, IEEE 802.11, wireless security, rogue AP |
16 | Andrew Gin, Ray Hunt |
Performance analysis of evolving wireless IEEE 802.11 security architectures.  |
Mobility Conference  |
2008 |
DBLP DOI BibTeX RDF |
IEEE 802.1x, TKIP (temporal key integrity protocol), WiFi protected access (WPA, WPA2), performance analysis, wireless LAN, PDA (personal digital assistant), IEEE 802.11i |
16 | Hongda Yin, Guanling Chen, Jie Wang 0002 |
Detecting protected layer-3 rogue APs.  |
BROADNETS  |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Raheel A. Malik, Raymond A. Hansen, James E. Goldman, Anthony H. Smith |
Laboratory modules for conducting comparative analysis of 802.11 frames.  |
SIGITE Conference  |
2007 |
DBLP DOI BibTeX RDF |
wireless networking education, information technology education |
16 | Binod Vaidya, SangDuck Lee, Jae-Kyun Han, Seung Jo Han |
Authentication Mechanism Using One-Time Password for 802.11 Wireless LAN.  |
CSR  |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Dong Phil Kim, Seok Joo Koh, Sang Wook Kim |
An Integrated Scheme for Intrusion Detection in WLAN.  |
ICOIN  |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Raquel Lacuesta Gilaberte, Lourdes Peñalver Herrero |
Spontaneous networks: Trust in a world of equals.  |
ICNS  |
2006 |
DBLP DOI BibTeX RDF |
|
16 | René Neumerkel, Stephan Groß |
A Sophisticated Solution for Revealing Attacks on Wireless LAN.  |
TrustBus  |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Kjell Jørgen Hole, Erlend Dyrnes, Per Thorsheim |
Securing Wi-Fi Networks.  |
Computer  |
2005 |
DBLP DOI BibTeX RDF |
wireless hacking, wireless security, virtual private networks, Wi-Fi networks |
16 | Fernando C. Colón Osorio, Emmanuel Agu, Kerry McKay |
Measuring energy-security tradeoffs in wireless networks.  |
IPCCC  |
2005 |
DBLP DOI BibTeX RDF |
|
16 | George Dean Bissias, Marc Liberatore, David D. Jensen, Brian Neil Levine |
Privacy Vulnerabilities in Encrypted HTTP Streams.  |
Privacy Enhancing Technologies  |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Hamdy S. Soliman, Mohammed Omari |
Application of synchronous dynamic encryption system in mobile wireless domains.  |
Q2SWinet  |
2005 |
DBLP DOI BibTeX RDF |
dynamic encryption, flexible integrity, integrity violations, mobile network security, permutation vectors, seamless handover |
16 | Debabrata Nayak, Deepak B. Phatak, Ved Prakash Gulati |
Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach.  |
ISPEC  |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, P. Sasikala, Seoung-Hyeon Lee, Jae-Kwang Lee |
Security Threats and Countermeasures in WLAN.  |
AINTEC  |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Stephen Michell, Kannan Srinivasan |
State based key hop protocol: a lightweight security protocol for wireless networks.  |
PE-WASUN  |
2004 |
DBLP DOI BibTeX RDF |
low power security, state based encryption, wireless security, computer network security, wireless sensor network security |
16 | Hea Suk Jo, Hee Yong Youn |
A New Synchronization Protocol for Authentication in Wireless LAN Environment.  |
ICCSA (1)  |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Hea Suk Jo, Hee Yong Youn |
A New Synchronization Protocol for Authentication in Wireless LAN Environment.  |
ICCSA (3)  |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Tadashi Komori, Takamichi Saito |
A Secure Wireless LAN System Retaining Privacy.  |
AINA (2)  |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Florina Almenárez, Daniel Díaz Sánchez, Andrés Marín López |
Secure Ad-Hoc mBusiness: EnhancingWindowsCE Security.  |
TrustBus  |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Daniel B. Faria, David R. Cheriton |
MobiCom poster: public-key-based secure Internet access.  |
ACM SIGMOBILE Mob. Comput. Commun. Rev.  |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Daniel B. Faria, David R. Cheriton |
DoS and authentication in wireless public access networks.  |
Workshop on Wireless Security  |
2002 |
DBLP DOI BibTeX RDF |
security, wireless networks, DoS |