-
6
-
-
67650793215
-
Malicious javascript insertion through ARP poisoning attacks
-
B. Zdrnja Malicious javascript insertion through ARP poisoning attacks IEEE Security & Privacy 7 3 2009 72 74
-
(2009)
IEEE Security & Privacy
, vol.7
, Issue.3
, pp. 72-74
-
-
Zdrnja, B.1
-
8
-
-
84888001436
-
-
I. Teterin, Antidote
-
I. Teterin, Antidote. < http://online.securityfocus.com/archive/1/ 299929 >.
-
-
-
-
11
-
-
34548039452
-
TARP: Ticket-based address resolution protocol
-
W. Lootah, W. Enck, and P. McDaniel TARP: ticket-based address resolution protocol Computer Networks 51 15 2007 4322 4337
-
(2007)
Computer Networks
, vol.51
, Issue.15
, pp. 4322-4337
-
-
Lootah, W.1
Enck, W.2
McDaniel, P.3
-
13
-
-
76749128929
-
Enhanced ARP: Preventing ARP poisoning-based man-in-the-middle attacks
-
S.Y. Nam, D. Kim, and J. Kim Enhanced ARP: preventing ARP poisoning-based man-in-the-middle attacks IEEE Communications Letters 14 2 2010 187 189
-
(2010)
IEEE Communications Letters
, vol.14
, Issue.2
, pp. 187-189
-
-
Nam, S.Y.1
Kim, D.2
Kim, J.3
-
14
-
-
23444452364
-
IEEE 802.11 rate adaptation: A practical approach
-
M. Lacage, M.H. Manshaei, T. Turletti, IEEE 802.11 rate adaptation: a practical approach, in: Proc. of ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM'04), 2004.
-
(2004)
Proc. of ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM'04)
-
-
Lacage, M.1
Manshaei, M.H.2
Turletti, T.3
-
15
-
-
84872864957
-
Mitigating ARP poisoning-based man-in-the-middle attacks in wired or wireless LAN
-
S.Y. Nam, S. Jurayev, S. Kim, K. Choi, and G.S. Choi Mitigating ARP poisoning-based man-in-the-middle attacks in wired or wireless LAN EURASIP Journal on Wireless Communications and Networking 89 2012
-
(2012)
EURASIP Journal on Wireless Communications and Networking
, vol.89
-
-
Nam, S.Y.1
Jurayev, S.2
Kim, S.3
Choi, K.4
Choi, G.S.5
-
16
-
-
0001126172
-
Pricing via processing or combatting junk mail
-
C. Dwork, M. Naor, Pricing via processing or combatting junk mail, in: Proc. of CRYPTO, 1992.
-
(1992)
Proc. of CRYPTO
-
-
Dwork, C.1
Naor, M.2
-
18
-
-
36949036429
-
Portcullis: Protecting connection setup from denial-of-capability attacks
-
Kyoto, Japan
-
B. Parno, D. Wendlandt, E. Shi, A. Perrig, B. Maggs, Y-C. Hu, Portcullis: protecting connection setup from denial-of-capability attacks, in: Proc. of SIGCOMM, Kyoto, Japan, 2007.
-
(2007)
Proc. of SIGCOMM
-
-
Parno, B.1
Wendlandt, D.2
Shi, E.3
Perrig, A.4
Maggs, B.5
Hu, Y.-C.6
-
19
-
-
84888005890
-
-
Gratuitous ARP - The Wireshark Wiki
-
Gratuitous ARP - The Wireshark Wiki. < http://wiki.wireshark.org/ Gratuitous-ARP >.
-
-
-
-
23
-
-
0037984506
-
Performance evaluation of a fair backoff algorithm for IEEE 802.11 DFWMAC
-
Z. Fang, B. Bensaou, Y. Wang, Performance evaluation of a fair backoff algorithm for IEEE 802.11 DFWMAC, in: Prof. of ACM MOBIHOC, 2002.
-
(2002)
Prof. of ACM MOBIHOC
-
-
Fang, Z.1
Bensaou, B.2
Wang, Y.3
-
24
-
-
33144479732
-
Modeling the short-term unfairness of IEEE 802.11 in presence of hidden terminals
-
Z. Li, S. Nandi, and A.K. Gupta Modeling the short-term unfairness of IEEE 802.11 in presence of hidden terminals Performance Evaluation 63 4 2006 441 462
-
(2006)
Performance Evaluation
, vol.63
, Issue.4
, pp. 441-462
-
-
Li, Z.1
Nandi, S.2
Gupta, A.K.3
|