-
3
-
-
84888904110
-
A fair scheduling scheme for HCF
-
IEEE, 802.11-03/577r1
-
Q. Ni, P. Ansel, and T. Turletti, "A Fair Scheduling Scheme for HCF," IEEE, 802.11e working group document, 802.11-03/577r1, 2003.
-
(2003)
802.11e Working Group Document
-
-
Ni, Q.1
Ansel, P.2
Turletti, T.3
-
4
-
-
0035018902
-
Differentiation mechanisms for IEEE 802.11
-
Apr.
-
I. Aad and C. Castellucia, "Differentiation mechanisms for IEEE 802.11," in Proc. IEEE INFOCOM, Apr. 2001, pp. 209-218.
-
(2001)
Proc. IEEE INFOCOM
, pp. 209-218
-
-
Aad, I.1
Castellucia, C.2
-
5
-
-
0032659031
-
A priority scheme for IEEE 802.11 DCF access method
-
J. Deng and R. S. Chang, "A priority scheme for IEEE 802.11 DCF access method," IEICE Trans. Commun., vol. 82-B, pp. 96-102, 1999.
-
(1999)
IEICE Trans. Commun.
, vol.82 B
, pp. 96-102
-
-
Deng, J.1
Chang, R.S.2
-
6
-
-
0035482112
-
Supporting service differentiation in wireless networks using distributed control
-
Oct.
-
A. Veres, A. T. Campbell, M. Barry, and L.-H. Sum, "Supporting service differentiation in wireless networks using distributed control," IEEE J. Sel. Areas Commun. (Special Issue on Mobility and Resource Management in Next Generation Wireless Systems), vol. 19, no. 10, pp. 2081-2093, Oct. 2001.
-
(2001)
IEEE J. Sel. Areas Commun. (Special Issue on Mobility and Resource Management in Next Generation Wireless Systems)
, vol.19
, Issue.10
, pp. 2081-2093
-
-
Veres, A.1
Campbell, A.T.2
Barry, M.3
Sum, L.-H.4
-
7
-
-
0035037228
-
Robust superpoll with chaining protocol for IEEE 802.11 wireless LAN in support of multimedia application
-
A. Ganz, A. Phonphoem, and Z. Ganz, "Robust superpoll with chaining protocol for IEEE 802.11 wireless LAN in support of multimedia application," Wireless Netw., pp. 65-73, 2001.
-
(2001)
Wireless Netw.
, pp. 65-73
-
-
Ganz, A.1
Phonphoem, A.2
Ganz, Z.3
-
8
-
-
84888909602
-
A new PCF scheme for multimedia traffic in IEEE 802.11 wireless LAN
-
A. Wei and S. Boumerdassi, "A new PCF scheme for multimedia traffic in IEEE 802.11 wireless LAN," CEDRIC, No. 389, 2002.
-
(2002)
CEDRIC
, Issue.389
-
-
Wei, A.1
Boumerdassi, S.2
-
9
-
-
84888901538
-
-
[Online]
-
National Institute of Standards and Technology Role Based Access Control. [Online]. Available: http://csrc.nist.gov/rbac
-
-
-
-
10
-
-
0029356674
-
Link-sharing and resource management models for packet networks
-
Aug.
-
S. Floyd and V. Jacobson, "Link-sharing and resource management models for packet networks," IEEE/ACM Trans. Netw., vol. 3, pp. 365-386, Aug. 1995.
-
(1995)
IEEE/ACM Trans. Netw.
, vol.3
, pp. 365-386
-
-
Floyd, S.1
Jacobson, V.2
-
11
-
-
84992227458
-
A proposed standard for role based access control
-
Aug.
-
D. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli, "A proposed standard for role based access control," ACM Trans. Inf. Syst. Security, vol. 4, no. 3, pp. 224-274, Aug. 2001.
-
(2001)
ACM Trans. Inf. Syst. Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
12
-
-
0036226679
-
On the migration from enterprise management to integrated service level management
-
Jan.
-
L. Lundy and R. Pradeep, "On the migration from enterprise management to integrated service level management," IEEE Network, vol. 16, no. 1, pp. 814-814, Jan. 2002.
-
(2002)
IEEE Network
, vol.16
, Issue.1
, pp. 814-814
-
-
Lundy, L.1
Pradeep, R.2
-
14
-
-
0038494603
-
Managing dynamic services: A contract based approach to a conceptual architecture
-
Apr., IEEE/IFIP 15-19
-
A. Keller, G. Kar, H. Ludwig, A. Dan, and J. L. Hellerstein, "Managing dynamic services: A contract based approach to a conceptual architecture," in Proc. Netw. Oper. Manage. Symp. (NOMS) 2002, Apr. 2002, IEEE/IFIP 15-19, pp. 513-528.
-
(2002)
Proc. Netw. Oper. Manage. Symp. (NOMS) 2002
, pp. 513-528
-
-
Keller, A.1
Kar, G.2
Ludwig, H.3
Dan, A.4
Hellerstein, J.L.5
-
15
-
-
0038386864
-
Profile-based subscriber service provisioning
-
Apr., IEEE/IFIP 15-19
-
F. Shen and A. Clemm, "Profile-based subscriber service provisioning," in Proc. Netw. Oper. Manag. Symp. (NOMS) 2002, Apr. 2002, IEEE/IFIP 15-19, pp. 561-574.
-
(2002)
Proc. Netw. Oper. Manag. Symp. (NOMS) 2002
, pp. 561-574
-
-
Shen, F.1
Clemm, A.2
-
18
-
-
0034777649
-
Intercepting mobile communications: The insecurity of 802.11
-
Jul.
-
N. Borisov, I. Goldberg, and D. Wagner, "Intercepting mobile communications: The insecurity of 802.11," in Proc. 7th Int. Conf. Mobile Comput. Netw., Jul. 2001, pp. 180-189.
-
(2001)
Proc. 7th Int. Conf. Mobile Comput. Netw.
, pp. 180-189
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
19
-
-
84949223752
-
Weaknesses in the key scheduling of RC4
-
S. Fluhrer, I. Mantin, and A. Shamir, "Weaknesses in the key scheduling of RC4," in Proc. 8th Ann. Workshop Sel. Areas Cryptography, 2001, pp. 1-24.
-
(2001)
Proc. 8th Ann. Workshop Sel. Areas Cryptography
, pp. 1-24
-
-
Fluhrer, S.1
Mantin, I.2
Shamir, A.3
-
20
-
-
84889956484
-
Using the Fluhrer, Mantin, and Shamir attack to break WEP
-
[Online]
-
A. Stubblefield, J. Ioannidis, and A. D. Rubin, "Using the Fluhrer, Mantin, and Shamir attack to break WEP," in Proc. Netw. Distrib. Syst. Security Symp. (NDSS), 2002, [Online]. Available: http://www.isoc.org/isoc/ conferences/ndss/02/proceedings/papers/stubbl.pdf.
-
(2002)
Proc. Netw. Distrib. Syst. Security Symp. (NDSS)
-
-
Stubblefield, A.1
Ioannidis, J.2
Rubin, A.D.3
-
21
-
-
1942444534
-
The dangers of mitigating security design flaws: A wireless case study
-
Jan.
-
N. L. Petroni, Jr. and W. A. Arbaugh, "The dangers of mitigating security design flaws: A wireless case study," IEEE Security and Privacy, pp. 28-36, Jan. 2003.
-
(2003)
IEEE Security and Privacy
, pp. 28-36
-
-
Petroni Jr., N.L.1
Arbaugh, W.A.2
-
23
-
-
0003218499
-
PPP extensible authentication protocol (EAP)
-
L. Blunk and J. Vollbrecht, "PPP extensible authentication protocol (EAP)," RFC 2284, 1998.
-
(1998)
RFC
, vol.2284
-
-
Blunk, L.1
Vollbrecht, J.2
-
26
-
-
84888930333
-
-
IEEE, Piscataway, NJ, 802.11-02/281r1
-
The Institute of Electrical and Electronics Engineers (IEEE), "Proposed TKIP 48 bit IV frame format," IEEE, Piscataway, NJ, 802.11-02/281r1, 2002.
-
(2002)
Proposed TKIP 48 Bit IV Frame Format
-
-
-
27
-
-
84888910466
-
Specification for enhanced security, a smart alliance
-
[Online]
-
Smart Card Alliance. (2003). Specification for enhanced security, a smart alliance, White Paper. [Online]. Available: http://www.smart-cardalliance.org/ pdf/allianceactivities/PrivacyWhitePaperFeb03.pdf
-
(2003)
White Paper
-
-
-
29
-
-
4544242940
-
An architecture for describing simple network management protocol (SNMP) management frameworks
-
STD62
-
D. Harrington, R. Presuhn, and B. Wijnen, "An architecture for describing simple network management protocol (SNMP) management frameworks," STD62, RFC 3411, 2002.
-
(2002)
RFC
, vol.3411
-
-
Harrington, D.1
Presuhn, R.2
Wijnen, B.3
-
33
-
-
84888910038
-
-
Ucopia Communications. [Online]
-
Ucopia Communications. [Online]. Available: http://www.ucopia.com
-
-
-
-
34
-
-
0034443301
-
Measurement and analysis of LDAP performance
-
Santa Clara, CA, Jun.
-
X. Wang, H. Schulzrinne, D. Kandlur, and D. Verma, "Measurement and analysis of LDAP performance," in Proc. Int. Conf. Measure. Modeling Comput. Syst., Santa Clara, CA, Jun. 2000, pp. 156-165.
-
(2000)
Proc. Int. Conf. Measure. Modeling Comput. Syst.
, pp. 156-165
-
-
Wang, X.1
Schulzrinne, H.2
Kandlur, D.3
Verma, D.4
-
35
-
-
17144418441
-
A hierarchical token bucket algorithm to enhance QoS in IEEE 802.11: Proposal
-
Los Angeles, CA, Sep.
-
J. L. Valenzuela, A. Monleon, I. S. Esteban, M. Portoles, and O. Sallent, "A hierarchical token bucket algorithm to enhance QoS in IEEE 802.11: Proposal," in Proc. IEEE Veh. Technol. Conf. Implementation Eval., Los Angeles, CA, Sep. 2004, pp. 2659-2662.
-
(2004)
Proc. IEEE Veh. Technol. Conf. Implementation Eval.
, pp. 2659-2662
-
-
Valenzuela, J.L.1
Monleon, A.2
Esteban, I.S.3
Portoles, M.4
Sallent, O.5
-
37
-
-
0003202408
-
Lightweight directory access protocol (v3)
-
M. Wahl, T. Howes, and S. Kille, "Lightweight directory access protocol (v3)," RFC 2251, 1997.
-
(1997)
RFC
, vol.2251
-
-
Wahl, M.1
Howes, T.2
Kille, S.3
-
38
-
-
18844366176
-
RADIUS (remote authentication dial in user service) support for extensible authentication protocol (EAP)
-
B. Aboba and P. Calhoun, "RADIUS (remote authentication dial in user service) support for extensible authentication protocol (EAP)," RFC 3579, 2003.
-
(2003)
RFC
, vol.3579
-
-
Aboba, B.1
Calhoun, P.2
-
40
-
-
84888910756
-
-
[Online]
-
Sun Microsystems Java Card Technology. [Online]. Available: http://java.sun.com/products/javacard/
-
-
-
-
41
-
-
84888904690
-
-
[Online]
-
MULTOS MULTOS Solutions. [Online]. Available: http://www.multos.com/
-
-
-
-
43
-
-
84888913827
-
-
[Online]
-
Axalto e-gate. [Online]. Available: http://www.axalto.com/infosec/egate. html
-
Axalto E-gate
-
-
-
45
-
-
84888927695
-
-
[Online]
-
PC/SC Workgroup. [Online]. Available: www.pcscworkgroup.com.
-
-
-
-
46
-
-
0003195066
-
The MD5 message-digest algorithm
-
R. Rivest, "The MD5 message-digest algorithm," RFC 1321, 1992.
-
(1992)
RFC
, vol.1321
-
-
Rivest, R.1
-
47
-
-
1542265638
-
US secure hash algorithm 1 (SHA1)
-
D. Eastlake and P. Jones, "US secure hash algorithm 1 (SHA1)," RFC 3174, 2001.
-
(2001)
RFC
, vol.3174
-
-
Eastlake, D.1
Jones, P.2
-
48
-
-
0003286492
-
The TLS protocol version 1.0
-
T. Dierks and C. Allen, "The TLS protocol version 1.0," RFC 2246, 1999.
-
(1999)
RFC
, vol.2246
-
-
Dierks, T.1
Allen, C.2
-
49
-
-
27644465472
-
Internet X.509 public key infrastructure certificate policy and certification practices framework
-
S. Chokhani et al., "Internet X.509 public key infrastructure certificate policy and certification practices framework," RFC 3647, 2003.
-
(2003)
RFC
, vol.3647
-
-
Chokhani, S.1
-
50
-
-
84888903793
-
-
[Online]
-
NetFilter. [Online]. Available: http://www.netfilter.org
-
-
-
|