-
1
-
-
0038675422
-
Authenticity in a reliable protocol for mobile computing
-
Melbourne, Florida, March 09 - 12, 2003). SAC '03. ACM, New York, NY. DOI
-
De Francesco, N. and Petrocchi, M. 2003. Authenticity in a reliable protocol for mobile computing. In Proceedings of the 2003 ACM Symposium on Applied Computing (Melbourne, Florida, March 09 - 12, 2003). SAC '03. ACM, New York, NY, 318-324. DOI: http://doi.acm.org/10.1145/952532.952597
-
(2003)
Proceedings of the 2003 ACM Symposium on Applied Computing
, pp. 318-324
-
-
De Francesco, N.1
Petrocchi, M.2
-
2
-
-
67650668236
-
Performance analysis of evolving wireless IEEE 802.ll security architectures
-
Yilan, Taiwan, September 10 - 12, 2008). Mobility '08. ACM, New York, NY. DOI
-
Gin, A. and Hunt, R. 2008. Performance analysis of evolving wireless IEEE 802.ll security architectures. In Proceedings of the international Conference on Mobile Technology, Applications, and Systems (Yilan, Taiwan, September 10 - 12, 2008). Mobility '08. ACM, New York, NY, 1-6. DOI: http://doi.acm.org/10. 1145/1506270.1506393
-
(2008)
Proceedings of the International Conference on Mobile Technology, Applications, and Systems
, pp. 1-6
-
-
Gin, A.1
Hunt, R.2
-
3
-
-
44049102284
-
Encryption as an effective tool in reducing wireless LAN vulnerabilities
-
Fifth International Conference on Information Technology: New Generations (itng 2008)
-
Jiang Li, Moses Gamba, "Encryption as an Effective Tool in Reducing Wireless LAN Vulnerabilities," itng, pp.557-562, Fifth International Conference on Information Technology: New Generations (itng 2008), 2008
-
(2008)
Itng
, pp. 557-562
-
-
Li, J.1
Gamba, M.2
-
4
-
-
11244278744
-
Analysis of the 802.lli 4-way handshake
-
Philadelphia, PA, USA, October 01 - 01, 2004). WiSe '04. ACM, New York, NY. DOI
-
He, C. and Mitchell, J. C. 2004. Analysis of the 802.lli 4-way handshake. In Proceedings of the 3rd ACM Workshop on Wireless Security (Philadelphia, PA, USA, October 01 - 01, 2004). WiSe '04. ACM, New York, NY,43-0.DOI: http://doi.acm.org/10.1145/1023646.1023655Jhj
-
(2004)
Proceedings of the 3rd ACM Workshop on Wireless Security
, pp. 43-0
-
-
He, C.1
Mitchell, J.C.2
-
5
-
-
85008006368
-
Will IEEE 802.1X Finally Take off in 2008?
-
Mar. doi: 10.11 091MC.2008.103
-
Neal Leavitt, "Will IEEE 802.1X Finally Take Off in 2008?," Computer, vol. 41, no. 3, pp. 12-15, Mar. 2008, doi: 10.11 091MC.2008.103
-
(2008)
Computer
, vol.41
, Issue.3
, pp. 12-15
-
-
Leavitt, N.1
-
6
-
-
70350555292
-
Research on authentication security of wireless local area network based on L2TP protocol
-
2009 lIT A International Conference on Services Science, Management and Engineering
-
Yan Niu, Jun Li, Lala Li, "Research on Authentication Security of Wireless Local Area Network Based on L2TP Protocol," ssme, pp.491-494, 2009 lIT A International Conference on Services Science, Management and Engineering, 2009
-
(2009)
Ssme
, pp. 491-494
-
-
Niu, Y.1
Li, J.2
Li, L.3
-
7
-
-
4544276461
-
A smartcard for authentication in WLANs
-
La Paz, Bolivia, October 03 - 05, 2003). LANC '03. ACM, New York, NY, 1Bhagyavati-130. DOI
-
Loutrel, M., Urien, P., and Pujolle, G. 2003. A smartcard for authentication in WLANs. In Proceedings of the 2003 IFIP/ACM Latin America Conference on Towards A Latin American Agenda For Network Research (La Paz, Bolivia, October 03 - 05, 2003). LANC '03. ACM, New York, NY, 1Bhagyavati-130. DOI: http://doi.acm.org/10.1145/1035662.1035673
-
(2003)
Proceedings of the 2003 IFIP/ACM Latin America Conference on Towards A Latin American Agenda for Network Research
-
-
Loutrel, M.1
Urien, P.2
Pujolle, G.3
-
8
-
-
37649032986
-
IMEWAS-A integrated multi-platform EAPoW-based WLAN AAA solution
-
Third International Conference on Wireless and Mobile Communications (ICWMC'07)
-
Ling Chen, Jian-de Lu, "IMEWAS-A Integrated Multi-platform EAPoW-Based WLAN AAA Solution," icwmc, pp.17, Third International Conference on Wireless and Mobile Communications (ICWMC'07), 2007
-
(2007)
Icwmc
, pp. 17
-
-
Chen, L.1
Lu, J.-D.2
-
9
-
-
33750961614
-
Choosing the right wireless LAN security protocol for the home and business user
-
First International Conference on Availability, Reliability and Security (ARES'06)
-
Carsten Maple, Helen Jacobs, Matthew Reeve, "Choosing the Right Wireless LAN Security Protocol for the Home and Business User," ares, pp.1025-1032, First International Conference on Availability, Reliability and Security (ARES'06), 2006
-
(2006)
Ares
, pp. 1025-1032
-
-
Maple, C.1
Jacobs, H.2
Reeve, M.3
-
10
-
-
46849088783
-
Critical review of unsecured WEP
-
2007 IEEE Congress on Services (Services 2007)
-
Songhe Zhao, Charles A. Shoniregun, "CriticaJ Review of Unsecured WEP," services, pp.368-374, 2007 IEEE Congress on Services (Services 2007), 2007.
-
(2007)
Services
, pp. 368-374
-
-
Zhao, S.1
Shoniregun, C.A.2
-
11
-
-
0036983653
-
DoS and authentication in wireless public access networks
-
(Atlanta, GA, USA, September 28 28, 2002). WiSE '02. ACM, New York, NY, 47-56. DOI
-
Faria, D. B. and Cheriton, D. R. 2002. DoS and authentication in wireless public access networks. In Proceedings of the 1st ACM Workshop on Wireless Security (Atlanta, GA, USA, September 28 28, 2002). WiSE '02. ACM, New York, NY, 47-56. DOI: http://doi.acm.org/10.1145/570681. 570687
-
(2002)
Proceedings of the 1st ACM Workshop on Wireless Security
, pp. 570687
-
-
Faria, D.B.1
Cheriton, D.R.2
-
12
-
-
0035395659
-
Facing the challenge of wireless security
-
July, doi:10.1109/2.933495
-
Sandra Kay Miller, "Facing the Challenge of Wireless Security," Computer, vol. 34, no. 7, pp. 16-18, July 2001, doi:10.1109/2.933495
-
(2001)
Computer
, vol.34
, Issue.7
, pp. 16-18
-
-
Miller, S.K.1
-
13
-
-
0142103302
-
Park derrick dicoi WLAN security: Current and future
-
Sept., doi: 10.11 091MIC.2003.1232519
-
Joon S. Park, Derrick Dicoi, "WLAN Security: Current and Future," IEEE Internet Computing, vol. 7, no. 5, pp. 60-65, Sept. 2003, doi: 10.11 091MIC.2003.1232519
-
(2003)
IEEE Internet Computing
, vol.7
, Issue.5
, pp. 60-65
-
-
Joon, S.1
-
14
-
-
34548124975
-
Secure network authentication with passtext
-
International Conference on Information Technology (ITNG'07)
-
Roman V. Yampolskiy, "Secure Network Authentication with PassText," itng, pp.831-836, International Conference on Information Technology (ITNG'07), 2007
-
(2007)
Itng
, pp. 831-836
-
-
Yampolskiy, R.V.1
-
15
-
-
0542400928
-
Techniques for authentication protocols and key distribution on wireless ATM networks
-
Oct. 1998
-
Patiyoot, D. and Shepherd, S. J. 1998. Techniques for authentication protocols and key distribution on wireless ATM networks. SIGOPS Oper. Syst. Rev. 32, 4 (Oct. 1998), 25-32. DOI: http://doi.acm.org/10.1145/302350.302357
-
(1998)
SIGOPS Oper. Syst. Rev.
, vol.32
, Issue.4
, pp. 25-32
-
-
Patiyoot, D.1
Shepherd, S.J.2
-
16
-
-
80053134876
-
A new scheme for wireless network authentication system
-
International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06)
-
Jing Zhang, Bo Wang, "A New Scheme For Wireless Network Authentication System," icniconsmcl, pp.133, International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06), 2006
-
(2006)
Icniconsmcl
, pp. 133
-
-
Zhang, J.1
Wang, B.2
-
17
-
-
0037673434
-
Securing a wireless network
-
(Providence, Rhode Island, USA, November 20 - 23, 2002). SIGUCCS '02. ACM, New York, NY. DOI
-
Allen, J. and Wilson, J. 2002. Securing a wireless network. In Proceedings of the 30th Annual ACM SIGUCCS Conference on User Services (Providence, Rhode Island, USA, November 20 - 23, 2002). SIGUCCS '02. ACM, New York, NY, 213-215. DOI: http://doi.acm.org/10.1145/588646.588696
-
(2002)
Proceedings of the 30th Annual ACM SIGUCCS Conference on User Services
, pp. 213-215
-
-
Allen, J.1
Wilson, J.2
-
18
-
-
78650408501
-
Improved remote user authentication scheme preserving user anonymity
-
March
-
Mrs. C. Shoba Bindu, Dr P. Chandra Sekhar Reddy, Dr B.Satyanarayana " Improved Remote User Authentication Scheme Preserving User Anonymity" IJCSNS International Journal of Computer Science and Network Security, VOL.8 No. 3, March 2008, http://paper.ijcsns.org/07-bookl200803/ 20080310.pdf
-
(2008)
IJCSNS International Journal of Computer Science and Network Security
, vol.8
, Issue.3
-
-
Shoba Bindu, C.1
Reddy, P.C.S.2
Satyanarayana, B.3
-
19
-
-
48349106601
-
A study on MITM (Man in the Middle) vulnerability in wireless network Using 802.1X and EAP
-
2008 International Conference on Information Science and Security (ICISS 2008)
-
Hyunuk Hwang, Gyeok Jung, Kiwook Sohn, Sangseo Park, "A Study on MITM (Man in the Middle) Vulnerability in Wireless Network Using 802.1X and EAP," iciss, pp.164-170, 2008 International Conference on Information Science and Security (ICISS 2008), 2008
-
(2008)
Iciss
, pp. 164-170
-
-
Hwang, H.1
Jung, G.2
Sohn, K.3
Park, S.4
-
20
-
-
23944451334
-
Staying secure in an insecure world: 802.1x secure wireless computer connectivity for students, faculty, and staff to the campus network
-
(Baltimore, MD, USA, October 10 - 13, 2004). SIGUCCS '04. ACM, New York, NY. DOI
-
Brawn, S. K., Koan, R. M., and Caye, K. 2004. Staying secure in an insecure world: 802.1x secure wireless computer connectivity for students, faculty, and staff to the campus network. In Proceedings of the 32nd Annual ACM SIGUCCS Fall Conference (Baltimore, MD, USA, October 10 - 13, 2004). SIGUCCS '04. ACM, New York, NY, 273-277. DOI: http://doi.acm.org/10.ll45/1027802. 1027864
-
(2004)
Proceedings of the 32nd Annual ACM SIGUCCS Fall Conference
, pp. 273-277
-
-
Brawn, S.K.1
Koan, R.M.2
Caye, K.3
-
21
-
-
57849148618
-
Designs of a secure wireless LAN access technique and an intrusion detection system for home network
-
2008 Fourth International Conference on Networked Computing and Advanced Information Management
-
Tae-Sub Kim, Yi-Kang Kim, Byung-Bog Lee, Seung-Wan Ryu, Choong-Ho Cho, "Designs of a Secure Wireless LAN Access Technique and an Intrusion Detection System for Home Network," ncm, vol. 1, pp.318-324, 2008 Fourth International Conference on Networked Computing and Advanced Information Management, 2008
-
(2008)
Ncm
, vol.1
, pp. 318-324
-
-
Kim, T.-S.1
Kim, Y.-K.2
Lee, B.-B.3
Ryu, S.-W.4
Cho, C.-H.5
-
22
-
-
3042555130
-
A secure wireless LAN system retaining privacy
-
18th International Conference on Advanced Information Networking and Applications (AINA'04) Volume 2
-
Tadashi Komori, Takamichi Saito, "A Secure Wireless LAN System Retaining Privacy," aina, vol. 2, pp.370, 18th International Conference on Advanced Information Networking and Applications (AINA'04) Volume 2, 2004
-
(2004)
Aina
, vol.2
, pp. 370
-
-
Komori, T.1
Saito, T.2
-
23
-
-
56749092209
-
Wireless authentication using remote passwords
-
(Alexandria, VA, USA, March 31 - April 02, 2008). WiSec '08. ACM, New York, NY. DOI
-
Harding, A., van der Horst, T. W., and Seamons, K. E. 2008. Wireless authentication using remote passwords. In Proceedings of the First ACM Conference on Wireless Network Security (Alexandria, VA, USA, March 31 - April 02, 2008). WiSec '08. ACM, New York, NY, 24-29 .DOI : http://doi.acm.org/10. 1145/13 5Bhayavati33 .13 5Bhagy avati38.
-
(2008)
Proceedings of the First ACM Conference on Wireless Network Security
, pp. 24-29
-
-
Harding, A.1
Van Der Horst, T.W.2
Seamons, K.E.3
-
24
-
-
79960571305
-
Wireless security techniques: An overview
-
(Kennesaw, Georgia, October 08 - 08, 2004). InfoSecCD '04. ACM, New York, NY. DOI
-
Bhagyavati Summers, W. C., and DeJoie, A. 2004. Wireless security techniques: an overview. In Proceedings of the 1st Annual Conference on information Security Curriculum Development (Kennesaw, Georgia, October 08 - 08, 2004). InfoSecCD '04. ACM, New York, NY, 82-87. DOI: http://doi.acm.org/10. 1145/1059524.1059541
-
(2004)
Proceedings of the 1st Annual Conference on Information Security Curriculum Development
, pp. 82-87
-
-
Bhagyavati Summers, W.C.1
Dejoie, A.2
|