-
1
-
-
33846329954
-
-
802.11 network deployment, 802.11. wireless networks: the definitive guide. O'Reilly, April
-
Gast M (2002) 802.11 network deployment, 802.11. wireless networks: the definitive guide. O'Reilly, Sebastopol, CA, April
-
(2002)
Sebastopol, CA
-
-
Gast, M.1
-
2
-
-
0036027475
-
Trends in personal wireless data communications
-
Hannikainen M, Damalainen TD, Niemi M, Saarinen J (2002) Trends in personal wireless data communications. Comput Commun 25(1):84-99
-
(2002)
Comput Commun
, vol.25
, Issue.1
, pp. 84-99
-
-
Hannikainen, M.1
Damalainen, T.D.2
Niemi, M.3
Saarinen, J.4
-
3
-
-
33846333307
-
-
Karygiannis T, Owens L (2002) Wireless network security 802.11, bluetooth and handheld devices, National Institute of Technology, Special Publication, pp 800-848, November
-
Karygiannis T, Owens L (2002) Wireless network security 802.11, bluetooth and handheld devices, National Institute of Technology, Special Publication, pp 800-848, November
-
-
-
-
4
-
-
85177205755
-
-
Borisov N, Goldberg I, Wagner D (2001) Intercepting mobile Communications: the insecurity of 802.11. In: Proc of the ACM MobiCom'01, ACM, New York, pp 180-1.89, July
-
Borisov N, Goldberg I, Wagner D (2001) Intercepting mobile Communications: the insecurity of 802.11. In: Proc of the ACM MobiCom'01, ACM, New York, pp 180-1.89, July
-
-
-
-
7
-
-
0037001705
-
IPsec-based secure wireless virtual private networks
-
IEEE, Anaheim, CA, pp, October
-
Qu W, Srinivas S (2002) IPsec-based secure wireless virtual private networks. In: Proc of the IEEE MILCOM'02, vol 2, IEEE, Anaheim, CA, pp 1107-1112, October
-
(2002)
Proc of the IEEE MILCOM'02
, vol.2
, pp. 1107-1112
-
-
Qu, W.1
Srinivas, S.2
-
8
-
-
9544227378
-
An efficient quality of service routing algorithm for delay-sensitive aplications
-
January
-
Liu W, Lou W, Fang Y (2005) An efficient quality of service routing algorithm for delay-sensitive aplications. Comput Networks 47:87-104, January
-
(2005)
Comput Networks
, vol.47
, pp. 87-104
-
-
Liu, W.1
Lou, W.2
Fang, Y.3
-
9
-
-
0036980250
-
Secure wireless gateway
-
ACM, New York, pp, September
-
Godber A, Dasgupta P (2002) Secure wireless gateway. In: Proc of the ACM WiSe'02, ACM, New York, pp 41-46, September
-
(2002)
Proc of the ACM WiSe'02
, pp. 41-46
-
-
Godber, A.1
Dasgupta, P.2
-
10
-
-
4544257938
-
Security performance of loaded IEEE 802.11b wireless networks
-
November 2004
-
Baghaei N, Hunt R (2004) Security performance of loaded IEEE 802.11b wireless networks. Elsevier Comput Commun 27:1746-1756, November
-
(1746)
Elsevier Comput Commun
, vol.27
-
-
Baghaei, N.1
Hunt, R.2
-
11
-
-
0036983653
-
DoS and authentication in wireless public access networks
-
ACM, New York, pp, September
-
Faria DB, Cheriton DR (2002) DoS and authentication in wireless public access networks. In: Proceedings of the ACM workshop on wireless security (WiSe'02), ACM, New York, pp 47-56, September
-
(2002)
Proceedings of the ACM workshop on wireless security (WiSe'02)
, pp. 47-56
-
-
Faria, D.B.1
Cheriton, D.R.2
-
12
-
-
0036980638
-
Your 802.11 wireless network has no clothes
-
December
-
Arbaugh WA, Shankar N, Wang J, Zhang K (2002) Your 802.11 wireless network has no clothes. IEEE Wirel Commun Mag 9:44-51, December
-
(2002)
IEEE Wirel Commun Mag
, vol.9
, pp. 44-51
-
-
Arbaugh, W.A.1
Shankar, N.2
Wang, J.3
Zhang, K.4
-
13
-
-
19644386563
-
End-to-end framework for QoS guarantee in heterogeneous wired-cum-wireless networks
-
IEEE Computer Society, Washington, DC, pp, October
-
Li M, Zhu H, Sathyamurthy S, Chlamtac I, Prabhakaran B. (2004) End-to-end framework for QoS guarantee in heterogeneous wired-cum-wireless networks. In: Proc of the first international conference on quality of service in heterogeneous wired/wireless networks, IEEE Computer Society, Washington, DC, pp 140-147, October
-
(2004)
Proc of the first international conference on quality of service in heterogeneous wired/wireless networks
, pp. 140-147
-
-
Li, M.1
Zhu, H.2
Sathyamurthy, S.3
Chlamtac, I.4
Prabhakaran, B.5
-
14
-
-
0002515525
-
Mobile networking through mobile IP
-
January-February
-
Perkins CE (1998) Mobile networking through mobile IP. IEEE Internet Computing 2:58-69, January-February
-
(1998)
IEEE Internet Computing
, vol.2
, pp. 58-69
-
-
Perkins, C.E.1
-
16
-
-
33645220507
-
Improved distributed regional location management scheme for mobile IP
-
IEEE, Anaheim, CA, pp, September
-
Ma W, Fang Y (2003) Improved distributed regional location management scheme for mobile IP. In: Proceedings of the IEEE international symposium on personal, indoor and mobile radio communications (PIMRC'2003), vol 3. IEEE, Anaheim, CA, pp 2505-2509, September
-
(2003)
Proceedings of the IEEE international symposium on personal, indoor and mobile radio communications (PIMRC'2003)
, vol.3
, pp. 2505-2509
-
-
Ma, W.1
Fang, Y.2
-
18
-
-
33846271601
-
-
IPSEC
-
IPSEC, http://www.freeswan.org.
-
-
-
-
19
-
-
33846274361
-
-
802.1x Supplicant, http://www.open1x.org.
-
802.1x Supplicant, http://www.open1x.org.
-
-
-
-
20
-
-
33846266740
-
-
RADIUS
-
RADIUS, http://www.freeradius.org.
-
-
-
-
21
-
-
33846307233
-
-
OpenSSL
-
OpenSSL, http://www.openssl.org.
-
-
-
-
22
-
-
84860922330
-
-
Mobile IPv4, http://dynamics.sourceforge.net.
-
Mobile IPv4
-
-
-
23
-
-
3042686296
-
Formal verification of PAP and EAP-MD5 protocols in wireless networks: FDR model checking
-
IEEE Computer Society, Washington, DC, pp, March
-
Kim I-G, Choi J-Y (2004) Formal verification of PAP and EAP-MD5 protocols in wireless networks: FDR model checking. In: Proc of AINA, vol 2. IEEE Computer Society, Washington, DC, pp 264-269, March
-
(2004)
Proc of AINA
, vol.2
, pp. 264-269
-
-
Kim, I.-G.1
Choi, J.-Y.2
-
24
-
-
2942624556
-
Access control with IBM tivoli access manager
-
May
-
Karjoth G (2003) Access control with IBM tivoli access manager. ACM Trans Inf Syst Secur (TISSEC) 6:232-257 (May)
-
(2003)
ACM Trans Inf Syst Secur (TISSEC)
, vol.6
, pp. 232-257
-
-
Karjoth, G.1
-
26
-
-
24744451611
-
Security design and evaluation in a VoIP secure infrastracture: A policy based approach
-
IEEE Computer Society, Washington, DC, pp, April
-
Casola V, Rak M, Mazzeo A, Mazzoccca N (2005) Security design and evaluation in a VoIP secure infrastracture: a policy based approach. In: Proceedings of ITCC'05, vol 1. IEEE Computer Society, Washington, DC, pp 727-732, April
-
(2005)
Proceedings of ITCC'05
, vol.1
, pp. 727-732
-
-
Casola, V.1
Rak, M.2
Mazzeo, A.3
Mazzoccca, N.4
-
27
-
-
84908594245
-
Quality of protection for mobile multimedia applications
-
Baltimore, Maryland, 6-9 July
-
Ong CS, Nahrstedt K, Yuan W (2003) Quality of protection for mobile multimedia applications. In: Proceedings of the international conference on multimedia and expo (ICME) '03, vol 2, pp 137-40. Baltimore, Maryland, 6-9 July 2003
-
(2003)
Proceedings of the international conference on multimedia and expo (ICME) '03
, vol.2
, pp. 137-140
-
-
Ong, C.S.1
Nahrstedt, K.2
Yuan, W.3
-
28
-
-
33846334973
-
-
Aboba B, Simon D (1999) PPP EAP TLS athentication protocol. RFC 2716, RFC Editor, US, October
-
Aboba B, Simon D (1999) PPP EAP TLS athentication protocol. RFC 2716, RFC Editor, US, October
-
-
-
-
29
-
-
24744461146
-
ASIC-hardware-focused comparison for hash functions MD5, RIPEMD-160, and SHS
-
IEEE Computer Society, Washington, DC, pp, April
-
Satoh A, Inoue T (2005) ASIC-hardware-focused comparison for hash functions MD5, RIPEMD-160, and SHS. In: Proceedings of the international conference on information technology: coding and computing (ITCC'05), vol 1. IEEE Computer Society, Washington, DC, pp 532-537, April
-
(2005)
Proceedings of the international conference on information technology: Coding and computing (ITCC'05)
, vol.1
, pp. 532-537
-
-
Satoh, A.1
Inoue, T.2
-
30
-
-
29144503071
-
How well can the IEEE 802.11 wireless LAN support quality of service?
-
November
-
Zhai H, Chen X, Fang Y (2005) How well can the IEEE 802.11 wireless LAN support quality of service? IEEE Trans Wirel Commun 4:3084-3094, November
-
(2005)
IEEE Trans Wirel Commun
, vol.4
, pp. 3084-3094
-
-
Zhai, H.1
Chen, X.2
Fang, Y.3
|