![]() |
Volumn , Issue , 2008, Pages 167-172
|
Who is listening? Security in wireless networks
|
Author keywords
[No Author keywords available]
|
Indexed keywords
RISK ANALYSIS;
RISK ASSESSMENT;
SAFETY FACTOR;
SIGNAL PROCESSING;
ANALYSIS APPROACH;
APPLICATION LAYER;
COST STRUCTURES;
CROSS LAYERING;
DEFENSE STRATEGIES;
IDENTITY MANAGEMENT;
INTERNATIONAL CONFERENCES;
MULTIPLE LAYERS;
NETWORK LAYERS;
PHYSICAL LAYER;
RESOURCE MODELING;
SECURITY ISSUES;
SECURITY MECHANISMS;
SECURITY THREATS;
SIDE CHANNELS;
WORLD WAR II;
WIRELESS NETWORKS;
|
EID: 48149087287
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/ICSCN.2008.4447182 Document Type: Conference Paper |
Times cited : (3)
|
References (20)
|