-
1
-
-
0141981548
-
IEEE standards for information technology telecommunications and information exchange be- tween systems local and metropolitan area network specific requirements part 11: Wireless lan medium access control
-
IEEE 802.11 1999 Edition ISO/IEC 8802-11: 1999, IEEE
-
IEEE standards for information technology telecommunications and information exchange be- tween systems local and metropolitan area network specific requirements part 11: Wireless lan medium access control,". IEEE 802.11 1999 Edition ISO/IEC 8802-11: 1999, IEEE, 1999.
-
(1999)
-
-
-
2
-
-
0009733423
-
IEEE standard for local and metropolitan area net- works part 16: Air interface for fixed broadband wireless access systems
-
Tech. Rep. 802.16-2001, IEEE
-
IEEE standard for local and metropolitan area net- works part 16: Air interface for fixed broadband wireless access systems,". Tech. Rep. 802.16-2001, IEEE, 2001.
-
(2001)
-
-
-
3
-
-
84886488149
-
IEEE standard for information technology telecom- munications and information exchange between sys- tem local and metropolitan area networks specific requirements part 11: Wireless LAN
-
IEEE
-
"IEEE standard for information technology telecom- munications and information exchange between sys- tem local and metropolitan area networks specific requirements part 11: Wireless LAN,". tech. rep., IEEE, 2004.
-
(2004)
tech. rep.
-
-
-
4
-
-
0009733423
-
IEEE standard for local and metropolitan area net- works part 16: Air interface for fixed broadband wireless access systems
-
Tech. Rep. 802.16-2004, IEEE
-
"IEEE standard for local and metropolitan area net- works part 16: Air interface for fixed broadband wireless access systems,". Tech. Rep. 802.16-2004, IEEE, 2004.
-
(2004)
-
-
-
5
-
-
34248646352
-
IEEE standard for local and metropolitan area net- works part 16: Air interface for fixed and mobile broadband wireless access systems amendment 2: Physical andmedium access control layers for com- bined fixed
-
IEEE
-
"IEEE standard for local and metropolitan area net- works part 16: Air interface for fixed and mobile broadband wireless access systems amendment 2: Physical andmedium access control layers for com- bined fixed,". tech. rep., IEEE, 2005.
-
(2005)
tech. rep.
-
-
-
6
-
-
73449101405
-
IEEE standard for local and metropolitan area net- works part 16: Air interface for broadband wireless access systems amendment 1: Multiple relay specifi- cation
-
IEEE
-
"IEEE standard for local and metropolitan area net- works part 16: Air interface for broadband wireless access systems amendment 1: Multiple relay specifi- cation,". tech. rep., IEEE, 2009.
-
(2009)
tech. rep.
-
-
-
7
-
-
34250839908
-
Authentication authorization and accounting (AAA) schemes in wimax
-
in 2006 IEEE Interna-tional Conference on Electro/Information Technol-ogy, May 2006.
-
S. Adibi, B. Lin, P.H. Ho, G. Agnew, and S. Er- fani, "Authentication authorization and accounting (AAA) schemes in wimax," in 2006 IEEE Interna- tional Conference on Electro/Information Technol- ogy, pp. 210-215, May 2006.
-
-
-
Adibi, S.1
Lin, B.2
Ho, P.H.3
Agnew, G.4
Er-fani, S.5
-
8
-
-
84886474108
-
Mobile wimax security
-
Airspan.
-
Airspan. "Mobile wimax security,". tech. rep., 2007.
-
(2007)
tech. rep.
-
-
-
9
-
-
33845535776
-
Extensible authentication protocol (EAP) method requirements for wireless lan
-
Tech. Rep. RFC 4017.
-
D. Stanley andJ. Walker and B. Aboba. "Extensible authentication protocol (EAP) method requirements for wireless lan,". Tech. Rep. RFC 4017.
-
-
-
Stanley, D.1
Walker, J.2
Aboba, B.3
-
11
-
-
0034777649
-
Inter-cepting mobile communications: The insecurity of 802.11
-
in International Conference on Mobile Com-puting and Networking
-
N. Borisov, I. Goldberg, and D. Wagner, "Inter-cepting mobile communications: The insecurity of 802.11," in International Conference on Mobile Com-puting and Networking, pp. 180, 2001.
-
(2001)
, pp. 180
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
12
-
-
77950684579
-
Taming the blue beast: A survey of bluetooth based threats
-
J. Dunning, "Taming the blue beast: A survey of bluetooth based threats," IEEE Security & Privacy Magazine, vol. 8, no. 2, pp. 20-27, 2010.
-
(2010)
IEEE Security & Privacy Magazine
, vol.8
, Issue.2
, pp. 20-27
-
-
Dunning, J.1
-
13
-
-
33750125870
-
Formal verification of the IEEE 802.11i wlan se-curity protocol
-
in Australian Software Engineering Conference (ASWEC '06)
-
S. Zafar E. Sithirasenan and V. Muthukkumarasamy, "Formal verification of the IEEE 802.11i wlan se-curity protocol," in Australian Software Engineering Conference (ASWEC '06), pp. 181-190, 2006.
-
(2006)
, pp. 181-190
-
-
Zafar, S.1
Sithirasenan, E.2
Muthukkumarasamy, V.3
-
14
-
-
7544234721
-
Michael: An improved MIC for 802.11 WEP
-
IEEE
-
N. Ferguson. "Michael: An improved MIC for 802.11 WEP,". tech. rep., IEEE, 2002.
-
(2002)
tech. rep.
-
-
Ferguson, N.1
-
15
-
-
28344447554
-
Enhanced WEP: An ef-ficient solution to WEP threats
-
in Second IFIP International Conference on Wireless and Optical Communications Networks
-
H. Hassan and Y. Challal, "Enhanced WEP: An ef-ficient solution to WEP threats," in Second IFIP International Conference on Wireless and Optical Communications Networks, pp. 594-599, 2005.
-
(2005)
, pp. 594-599
-
-
Hassan, H.1
Challal, Y.2
-
17
-
-
84886503568
-
Observations on the message integrity code in IEEE802.11 wireless LANs
-
J. Huang, W. Susilo, and J. Seberry. "Observations on the message integrity code in IEEE802.11 wireless LANs,". tech. rep., 2008.
-
(2008)
tech. rep.
-
-
Huang, J.1
Susilo, W.2
Seberry, J.3
-
18
-
-
84886479895
-
On the security of the IEEE 802.11i message integrity code michael
-
J. Huang, W. Susilo, J. Seberry, and M. Bunder. "On the security of the IEEE 802.11i message integrity code michael,". tech. rep., 2004.
-
(2004)
tech. rep.
-
-
Huang, J.1
Susilo, W.2
Seberry, J.3
Bunder, M.4
-
19
-
-
3042685819
-
Overview of IEEE 802.16 security
-
D. Johnston and J. Walker, "Overview of IEEE 802.16 security," IEEE Security & Privacy Magazine, vol. 2, no. 3, pp. 40-48, 2004.
-
(2004)
IEEE Security & Privacy Magazine
, vol.2
, Issue.3
, pp. 40-48
-
-
Johnston, D.1
Walker, J.2
-
20
-
-
3042720550
-
Hardware implementation of blue-tooth security
-
P. Kitsos, N. Sklavos, K. Papadomanolakis, and O. Koufopavlou, "Hardware implementation of blue-tooth security," IEEE Pervasive Computing, vol. 2, no. 1, p. 21, 2003.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.1
, pp. 21
-
-
Kitsos, P.1
Sklavos, N.2
Papadomanolakis, K.3
Koufopavlou, O.4
-
21
-
-
47749085463
-
Attacks on the rc4 stream cipher
-
A. Klein, "Attacks on the rc4 stream cipher," De-signs, Codes and Cryptography, vol. 48, no. 3, p. 269, 2008.
-
(2008)
De-signs, Codes and Cryptography
, vol.48
, Issue.3
, pp. 269
-
-
Klein, A.1
-
22
-
-
84886535968
-
Pkcs #1: Rsa cryptography stan-dard
-
RSA Laboratories
-
R. Laboratories. "Pkcs #1: Rsa cryptography stan-dard,". tech. rep., RSA Laboratories.
-
tech. rep.
-
-
Laboratories, R.1
-
23
-
-
70349693933
-
A simple encryption scheme based on wimax
-
in 2009 International Conference on E-Business and Information System Security, , May 2009.
-
C. Luo, "A simple encryption scheme based on wimax," in 2009 International Conference on E-Business and Information System Security, pp. 1-4, May 2009.
-
-
-
Luo, C.1
-
24
-
-
38549178532
-
Security analysis of IEEE 802.16
-
in 2007 IEEE Interna-tional Conference on Communications, Glasgow, June 2007.
-
L. Maccari, M. Paoli, and R. Fantacci, "Security analysis of IEEE 802.16," in 2007 IEEE Interna-tional Conference on Communications, pp. 1160-1165, Glasgow, June 2007.
-
-
-
Maccari, L.1
Paoli, M.2
Fantacci, R.3
-
25
-
-
44249089502
-
Computer and Communication Networks
-
Prentice Hall
-
N. F. Mir, Computer and Communication Networks. Prentice Hall, 2006.
-
(2006)
-
-
Mir, N.F.1
-
26
-
-
84886572349
-
New e±cient rf fingerprint-based secu-rity solution for bluetooth secure simple pairing
-
S. Pasanen, "New e±cient rf fingerprint-based secu-rity solution for bluetooth secure simple pairing," Se-curity, pp. 1-8, 2010.
-
(2010)
Se-curity
, pp. 1-8
-
-
Pasanen, S.1
-
27
-
-
11244354854
-
Security considerations for IEEE 802.15.4 networks
-
New York, USA
-
N. Sastry and D. Wagner, "Security considerations for IEEE 802.15.4 networks," in Proceedings of the 2004 ACM Workshop on Wireless Security, p. 32, New York, USA, 2004.
-
(2004)
in Proceedings of the 2004 ACM Workshop on Wireless Security
, pp. 32
-
-
Sastry, N.1
Wagner, D.2
-
29
-
-
77953838402
-
Cracking the bluetooth pin
-
in Proceedings of the 3rd International Confer-ence on Mobile Systems
-
Y. Shaked and A. Wool, "Cracking the bluetooth pin," in Proceedings of the 3rd International Confer-ence on Mobile Systems, Applications, and Services, pp. 39-50, 2005.
-
(2005)
Applications, and Services
, pp. 39-50
-
-
Shaked, Y.1
Wool, A.2
-
30
-
-
84861608869
-
Study and Design of a Security Archi-tecture for Wireless Personal Area Networks
-
PhD thesis, KU Leuven
-
D. Singelee. Study and Design of a Security Archi-tecture for Wireless Personal Area Networks. PhD thesis, KU Leuven, 2008.
-
(2008)
-
-
Singelee, D.1
-
31
-
-
38549101578
-
Break-ing 104 bit WEP in less than 60 seconds
-
in Pro-ceedings of the 8th International Conference on In-formation Security Applications
-
E. Tews, R. P. Weinmann, and A. Pyshkin, "Break-ing 104 bit WEP in less than 60 seconds," in Pro-ceedings of the 8th International Conference on In-formation Security Applications, pp. 188-202, 2007.
-
(2007)
, pp. 188-202
-
-
Tews, E.1
Weinmann, R.P.2
Pyshkin, A.3
-
32
-
-
0041602326
-
Introduction to Cryptography with Coding Theory (2nd Edition)
-
Prentice Hall
-
W. Trappe and L. C. Washington, Introduction to Cryptography with Coding Theory (2nd Edition). Prentice Hall, 2005.
-
(2005)
-
-
Trappe, W.1
Washington, L.C.2
-
33
-
-
7544239419
-
A note on the fragility of the michael mes-sage integrity code
-
A. Wool, "A note on the fragility of the michael mes-sage integrity code," IEEE Transactions on Wireless Communications, vol. 3, no. 5, pp. 1459-1462, 2004.
-
(2004)
IEEE Transactions on Wireless Communications
, vol.3
, Issue.5
, pp. 1459-1462
-
-
Wool, A.1
-
35
-
-
35148814392
-
Security of IEEE 802.16 in mesh mode
-
Oct. 2006
-
Y. Zhou and Y. Fang, "Security of IEEE 802.16 in mesh mode," in MILCOM 2006, pp. 1-6, Oct. 2006.
-
in MILCOM 2006
, pp. 1-6
-
-
Zhou, Y.1
Fang, Y.2
|