-
1
-
-
84925368904
-
802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
-
J. Bellardo and S. Savage, "802.11 denial-of-service attacks: Real vulnerabilities and practical solutions," in Proceedings of the USENIX Security Symposium, 2003, pp. 15-28.
-
(2003)
Proceedings of the USENIX Security Symposium
, pp. 15-28
-
-
Bellardo, J.1
Savage, S.2
-
2
-
-
0013046241
-
An initial security analysis of the ieee 802.1x standard,
-
Tech. Rep. CS-TR-4328, University of Maryland, College Park
-
A. Mishra and W. A. Arbaugh, "An initial security analysis of the ieee 802.1x standard," Tech. Rep. CS-TR-4328, University of Maryland, College Park, 2002.
-
(2002)
-
-
Mishra, A.1
Arbaugh, W.A.2
-
3
-
-
34247366075
-
Your 802.11 network has no clothes
-
A. Mishra, M. ho Shin, and W. A. Arbaugh, "Your 802.11 network has no clothes," IEEE Communications Magazine, pp. 44-51, 2002.
-
(2002)
IEEE Communications Magazine
, pp. 44-51
-
-
Mishra, A.1
ho Shin, M.2
Arbaugh, W.A.3
-
4
-
-
84943529186
-
LHAP: A lightweight hop-by-hop authentication protocol for ad-hoc networks
-
May
-
S. Zhu, S. Xu, S. Setia, and S. Jajodia, "LHAP: A lightweight hop-by-hop authentication protocol for ad-hoc networks," in IEEE International Workshop on Mobile and Wireless Network (MWN 2003), May 2003, pp. 749-755.
-
(2003)
IEEE International Workshop on Mobile and Wireless Network (MWN 2003)
, pp. 749-755
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
-
7
-
-
33746299217
-
Secure and efficient key management in mobile ad hoc networks
-
B. Wu, J. Wu, E. Fernandez, and S. Magliveras, "Secure and efficient key management in mobile ad hoc networks," in 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05), 2005.
-
(2005)
19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05)
-
-
Wu, B.1
Wu, J.2
Fernandez, E.3
Magliveras, S.4
-
8
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou and Z. Haas, "Securing ad hoc networks," IEEE Network, vol. 13, no. 6, pp. 24-30, 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.2
-
10
-
-
26644439585
-
Lightweight key management for ieee 802.11 wireless lans with key refresh and host revocation
-
A. Wool, "Lightweight key management for ieee 802.11 wireless lans with key refresh and host revocation," ACM/Springer Wireless Networks, vol. 11, no. 6, pp. 677-686, 2005.
-
(2005)
ACM/Springer Wireless Networks
, vol.11
, Issue.6
, pp. 677-686
-
-
Wool, A.1
-
14
-
-
33749064136
-
Multimac- an adaptive mac framework for dynamic radio networking
-
Nov
-
C. Doerr, M. Neufeld, J. Fifield, T. Weingart, D. C. Sicker, and D. Grunwald, "Multimac- an adaptive mac framework for dynamic radio networking," in DySpan 2005, 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, Nov 2005.
-
(2005)
DySpan 2005, 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks
-
-
Doerr, C.1
Neufeld, M.2
Fifield, J.3
Weingart, T.4
Sicker, D.C.5
Grunwald, D.6
-
15
-
-
77953835611
-
An overlay mac layer for 802.11 networks
-
A. Rao and I. Stoica, "An overlay mac layer for 802.11 networks," in MobiSys '05: Proceedings of the 3rd international conference on Mobile systems, applications, and services, 2005, pp. 135-148.
-
(2005)
MobiSys '05: Proceedings of the 3rd international conference on Mobile systems, applications, and services
, pp. 135-148
-
-
Rao, A.1
Stoica, I.2
-
16
-
-
0036152263
-
On credibility of simulation studies of telecommunication networks
-
K. Pawlikowski, H. D. J. Jeong, and J. S. R. Lee, "On credibility of simulation studies of telecommunication networks," IEEE Communications Magazine, vol. 40, no. 1, pp. 132-139, 2002.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.1
, pp. 132-139
-
-
Pawlikowski, K.1
Jeong, H.D.J.2
Lee, J.S.R.3
|