-
1
-
-
84863589267
-
-
IEEE Std 802.11- IEEE Standard for Telecommunications and Information Exchange Between Systems-LAN/MAN Specific Requirements - Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Specification for Operation in Additional Regulatory Domains
-
IEEE Std 802.11-2003. IEEE Standard for Telecommunications and Information Exchange Between Systems-LAN/MAN Specific Requirements - Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Specification for Operation in Additional Regulatory Domains
-
(2003)
-
-
-
2
-
-
0031237594
-
IEEE 802.11 wireless local area networks
-
10.1109/35.620533, 0163-6804
-
Crow, B.P., Widjaja, I., Kim, L.G., and Sakai, P.T.: 'IEEE 802.11 wireless local area networks', IEEE Commun. Mag., 1997, 35, (9), p. 116-12610.1109/35.620533 0163-6804
-
(1997)
IEEE Commun. Mag.
, vol.35
, Issue.9
, pp. 116-126
-
-
Crow, B.P.1
Widjaja, I.2
Kim, L.G.3
Sakai, P.T.4
-
3
-
-
0036980638
-
Your 802.11 wireless network has no clothes
-
10.1109/MWC.2002.1160080, 1536-1284
-
Arbaugh, W.A., Shankar, N., Wan, Y.C.J., and Zhang, K.: 'Your 802.11 wireless network has no clothes', IEEE Wirel. Commun., 2002, 9, (6), p. 44-5110.1109/MWC.2002.1160080 1536-1284
-
(2002)
IEEE Wirel. Commun.
, vol.9
, Issue.6
, pp. 44-51
-
-
Arbaugh, W.A.1
Shankar, N.2
Wan, Y.C.J.3
Zhang, K.4
-
4
-
-
0034777649
-
Intercepting mobile communications: the insecurity of 802.11
-
July 16-21
-
Nikita, B., Lan, G., and David, W.: 'Intercepting mobile communications: the insecurity of 802.11', Proc. Seventh Annual Int. Conf. on Mobile Computing and Networking (MobiCom'01), July 16-21 2001, p. 180-188
-
(2001)
Proc. Seventh Annual Int. Conf. on Mobile Computing and Networking (MobiCom'01)
, pp. 180-188
-
-
Nikita, B.1
Lan, G.2
David, W.3
-
5
-
-
84863571200
-
-
IEEE P802.11i. Draft Supplement to STANDARD FOR Telecommunications and Information Exchange Between Systems-LAN/MAN Specific Requirements - Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Specification for Operation in Additional Regulatory Domains
-
IEEE P802.11i. Draft Supplement to STANDARD FOR Telecommunications and Information Exchange Between Systems-LAN/MAN Specific Requirements - Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Specification for Operation in Additional Regulatory Domains
-
, Issue.PART 11
-
-
-
6
-
-
84863589270
-
-
Wireless Authentication and Privacy Infrastructure (WAPI): GB15629.11-2003, Chinese National Standard Press, May
-
Wireless Authentication and Privacy Infrastructure (WAPI): GB15629.11-2003, Chinese National Standard Press, May 2003
-
(2003)
-
-
-
7
-
-
84863571202
-
-
Wireless Authentication and Privacy Infrastructure (WAPI): GB15629.11-2003/XG1-2006, Chinese National Standard Press, 27 January
-
Wireless Authentication and Privacy Infrastructure (WAPI): GB15629.11-2003/XG1-2006, Chinese National Standard Press, 27 January 2006
-
(2006)
-
-
-
8
-
-
77956551249
-
Two level authenticated group key agreement protocol with privacy-preservation for resource-limited mobile devices
-
1607-9264
-
Chang, L.P., Wu, T.C., Hsu, C.L., and Lu, C.F.: 'Two level authenticated group key agreement protocol with privacy-preservation for resource-limited mobile devices', J. Internet Technol., 2010, 11, (4), p. 519-5281607-9264
-
(2010)
J. Internet Technol.
, vol.11
, Issue.4
, pp. 519-528
-
-
Chang, L.P.1
Wu, T.C.2
Hsu, C.L.3
Lu, C.F.4
-
9
-
-
84911875895
-
A survey of key distribution in wireless sensor networks
-
published online10.1002/sec.354
-
Chen, C.Y., and Chao, H.C.: 'A survey of key distribution in wireless sensor networks', Secur. Commun. Netw., 2011, published online10.1002/sec.354
-
(2011)
Secur. Commun. Netw.
-
-
Chen, C.Y.1
Chao, H.C.2
-
10
-
-
80052492581
-
An advanced password authenticated key exchange protocol for imbalanced wireless networks
-
1607-9264
-
Lo, J.W., Lee, J.Z., Hwang, M.S., and Chu, Y.P.: 'An advanced password authenticated key exchange protocol for imbalanced wireless networks', J. Internet Technol., 2010, 11, (7), p. 997-10041607-9264
-
(2010)
J. Internet Technol.
, vol.11
, Issue.7
, pp. 997-1004
-
-
Lo, J.W.1
Lee, J.Z.2
Hwang, M.S.3
Chu, Y.P.4
-
11
-
-
79957583041
-
Multimedia traffic security architecture for internet of things
-
10.1109/MNET.2011.5772059, 0890-8044
-
Zhou, L., and Chao, H.C.: 'Multimedia traffic security architecture for internet of things', IEEE Netw., 2011, 25, (3), p. 29-3410.1109/MNET.2011.5772059 0890-8044
-
(2011)
IEEE Netw.
, vol.25
, Issue.3
, pp. 29-34
-
-
Zhou, L.1
Chao, H.C.2
-
13
-
-
84863253526
-
Early security key exchange for encryption in mobile IPv6 handoff
-
10.1002/sec.62
-
Wu, T.Y., Lo, C.H., and Chao, H.C.: 'Early security key exchange for encryption in mobile IPv6 handoff', Secur. Commun. Netw., 2008, 1, (6), p. 511-52010.1002/sec.62
-
(2008)
Secur. Commun. Netw.
, vol.1
, Issue.6
, pp. 511-520
-
-
Wu, T.Y.1
Lo, C.H.2
Chao, H.C.3
-
14
-
-
24144432124
-
Efficient multi-receiver identity-based encryption and its application to broadcast encryption
-
January 23-26,
-
Baek, J., Reihaneh, S.N., and Susilo, W.: 'Efficient multi-receiver identity-based encryption and its application to broadcast encryption', Proc. Eighth Int. Workshop on Theory and Practice in Public Key Cryptography (PKC'05), January 23-26 2005, p. 380-397
-
(2005)
Proc. Eighth Int. Workshop on Theory and Practice in Public Key Cryptography (PKC'05)
, pp. 380-397
-
-
Baek, J.1
Reihaneh, S.N.2
Susilo, W.3
-
15
-
-
38049032849
-
A correctness proof of WAPI certificate authentication protocol
-
September 21-25
-
Tie, M.X., Li, J.D., Huang, Z.H., and Wang, Y.M.: 'A correctness proof of WAPI certificate authentication protocol', Proc. 2007 Int. Conf. on Wireless Communications, Networking and Mobile Computing (WiCom'07), September 21-25 2007, p. 2310-2313
-
(2007)
Proc. 2007 Int. Conf. on Wireless Communications, Networking and Mobile Computing (WiCom'07)
, pp. 2310-2313
-
-
Tie, M.X.1
Li, J.D.2
Huang, Z.H.3
Wang, Y.M.4
-
16
-
-
77249132433
-
Privacy and the law in demand response energy systems
-
Samuelson Law, Technology, and Public Policy Clinic, University of California, Berkeley
-
Mulligan, D.K., Lerner, J.I., and Jones, E.: et al. 'Privacy and the law in demand response energy systems', Samuelson Law, Technology, and Public Policy Clinic, University of California, Berkeley, 2006
-
(2006)
-
-
Mulligan, D.K.1
Lerner, J.I.2
Jones, E.3
-
17
-
-
34648828586
-
Noninteractive two-channel message authentication based on hybrid-collision resistant hash functions
-
10.1049/iet-ifs:20060131
-
Mashatan, A., and Stinson, D.R.: 'Noninteractive two-channel message authentication based on hybrid-collision resistant hash functions', IET Inf. Secur., 2007, 1, (3), p. 111-11810.1049/iet-ifs:20060131
-
(2007)
IET Inf. Secur.
, vol.1
, Issue.3
, pp. 111-118
-
-
Mashatan, A.1
Stinson, D.R.2
-
18
-
-
25144472173
-
A new (t, n) multi-secret sharing scheme based on Shamir's secret sharing
-
10.1016/j.amc.2004.06.120, 0096-3003
-
Pang, L.J., and Wang, Y.M.: 'A new (t, n) multi-secret sharing scheme based on Shamir's secret sharing', Appl. Math. Comput., 2005, 167, (2), p. 840-84810.1016/j.amc.2004.06.120 0096-3003
-
(2005)
Appl. Math. Comput.
, vol.167
, Issue.2
, pp. 840-848
-
-
Pang, L.J.1
Wang, Y.M.2
|