The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for wep with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1986-2004 (24) 2005 (17) 2006 (15) 2007-2008 (20) 2009-2013 (17) 2015-2023 (8)
Publication types (Num. hits)
article(26) inproceedings(75)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 97 occurrences of 53 keywords

Results
Found 101 publication records. Showing 101 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
141Soundararajan Chandramathi, K. V. Arunkumar, S. Deivarayan, P. Sendhilkumar Fuzzy based dynamic WEP keymanagement for WLAN security enhancement. Search on Bibsonomy COMSWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
92Andrea Bittau, Mark Handley, Joshua Lackey The Final Nail in WEP's Coffin. Search on Bibsonomy S&P The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
91Kevin Richardson, John A. Hamilton Jr., Martin C. Carlisle A performance analysis of the spring protocol through simulation. Search on Bibsonomy SpringSim (3) The full citation details ... 2007 DBLP  BibTeX  RDF SPRiNG, network simulation, wireless security, OPNET, WEP
75Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin Breaking 104 Bit WEP in Less Than 60 Seconds. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
75Adam Stubblefield, John Ioannidis, Aviel D. Rubin A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF wired equivalent privacy, Wireless security
67Erik Tews, Martin Beck Practical attacks against WEP and WPA. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, 802.11, rc4, wep, wlan, wpa, tkip
67Mohammad Saleh, Iyad Al Khatib Performance of Secure Ad Hoc Sensor Networks Utilizing IEEE802.11b WEP. Search on Bibsonomy Systems Communications The full citation details ... 2005 DBLP  DOI  BibTeX  RDF IEEE802.11b, security, sensor networks, performance, Ad hoc, WEP
59Songhe Zhao, Charles A. Shoniregun Critical Review of Unsecured WEP. Search on Bibsonomy IEEE SCW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
59Toshihiro Ohigashi, Yoshiaki Shiraishi, Masakatu Morii FMS Attack-Resistant WEP Implementation Is Still Broken. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
58Serge Vaudenay, Martin Vuagnoux Passive-Only Key Recovery Attacks on RC4. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF key related attack, cryptanalysis, stream cipher, RC4, WEP
58Jin-Cherng Lin, Yu-Hsin Kao, Chen-Wei Yang Secure Enhanced Wireless Transfer Protocol. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IEEE 802.11 Family, SEWTP, WLAN, WEP, TKIP
57Wen-Chuan Hsieh, Chi-Chun Lo, Jing-Chi Lee, Li-Tsung Huang The Implementation of a Proactive Wireless Intrusion Detection System. Search on Bibsonomy CIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Wireless Intrusion Detection System (WIDS), Wired Equivalent Privacy (WEP), 802.11, Short Message Service (SMS), Wireless Local Area Network (WLAN)
49Avishai Wool A note on the fragility of the "Michael" message integrity code. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
42Itsik Mantin A Practical Attack on the Fixed RC4 in the WEP Mode. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Related IV attacks, Cryptanalysis, Stream ciphers, Side-channel attacks, Fault analysis, RC4, Related key attacks
42Chi Hyung In, Choong Seon Hong, Il Gyu Song A Scheme for Improving WEP Key Transmission between APs in Wireless Environment. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
41Douglas E. Ennis The wireless tightrope: an economical, secure, and user friendly approach for the wireless campus. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF EAP-TLS, MSCHAPv2, PEAP, SSL certificates, SWAN, WLCCP, WEP, 802.1X
41Jon Allen, Jeff Wilson Securing a wireless network. Search on Bibsonomy SIGUCCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF EAP-LEAP, EAP-MD5, EAP-TLS, EAP-TTLS, VPN, WEP, 802.11i, 802.1x
33Shaneel Narayan, Samad S. Kolahi, Yonathan Sunarto, Du D. T. Nguyen, Paul Mani The Influence of Wireless 802.11g LAN Encryption Methods on Throughput and Round Trip Time for Various Windows Operating Systems. Search on Bibsonomy CNSR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Windows operating system, performance, wireless, throughput, encryption, response time
33Samad S. Kolahi, Shaneel Narayan, Du D. T. Nguyen, Yonathan Sunarto, Paul Mani The impact of wireless LAN security on performance of different Windows operating systems. Search on Bibsonomy ISCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Gulsum Zeynep Gurkas Aydin, Abdül Halim Zaim, M. Ali Aydin Security Mechanisms And Their Performance Impacts On Wireless Local Area Networks. Search on Bibsonomy ISCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Sabine Kebreau, Barbu Constantinescu, Samuel Pierre A New Security Approach for WLAN. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Avishai Wool Lightweight Key Management for IEEE 802.11 Wireless LANs with Key Refresh and Host Revocation. Search on Bibsonomy Wirel. Networks The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, authentication
33Duhyun Bae, Jiho Kim, Sehyun Park, Ohyoung Song Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Emmanuel López-Trejo, Francisco Rodríguez-Henríquez, Arturo Díaz-Pérez An FPGA Implementation of CCM Mode Using AES. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Ahmad M. Kholaif, Magda B. Fayek, Hussein Sherif Eissa, Hoda Baraka DRKH: A Power Efficient Encryption Protocol forWireless Devices. Search on Bibsonomy LCN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Power Devices, Dynamic Re-keying, Key Hopping, Authentication, WLAN Security
33Nikita Borisov, Ian Goldberg, David A. Wagner 0001 Intercepting mobile communications: the insecurity of 802.11. Search on Bibsonomy MobiCom The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
26Ren-Zun Lian, Xing-Yue Guo Work-Energy Principle (WEP)-Based Characteristic Mode Theory for Wireless Power Transfer Systems. Search on Bibsonomy ICCCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Zhengqiao Lu 基于混沌和WEP的无线传感器网络加密研究 (Encryption of Wireless Sensor Networks Based on Chaos and WEP). Search on Bibsonomy 计算机科学 The full citation details ... 2019 DBLP  BibTeX  RDF
26José A. R. Pacheco de Carvalho, Hugo Veiga, Claudia F. F. P. Ribeiro Pacheco, Antonio D. Reis Performance Evaluation of IEEE 802.11a 54 Mbps WEP Multi-Node Laboratory Links. Search on Bibsonomy CSNDSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Yuhei Watanabe, Takahiro Iriyama, Masakatu Morii Proposal of WEP Operation with Strong IV and Its Implementation. Search on Bibsonomy J. Inf. Process. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26José A. R. Pacheco de Carvalho, Hugo Veiga, Claudia F. F. P. Ribeiro Pacheco, Antonio D. Reis Laboratory performance measurements of IEEE 802.11 a WEP PTMP links. Search on Bibsonomy CSNDSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Masafumi Yamada, Tetsuya Oda, Yi Liu 0011, Masahiro Hiyama, Keita Matsuo, Leonard Barolli Performance Evaluation of an IoT-based e-Learning Testbed Considering OLSR and WEP Protocols. Search on Bibsonomy IMIS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Cerstin Mahlow C-WEP―Rich Annotated Collection of Writing Errors by Professionals. Search on Bibsonomy LREC The full citation details ... 2016 DBLP  BibTeX  RDF
26Pouyan Sepehrdad, Petr Susil, Serge Vaudenay, Martin Vuagnoux Tornado Attack on RC4 with Applications to WEP & WPA. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
26Mattia D'Antonio, Paolo D'Onorio De Meo, Daniele Paoletti, Berardino Elmi, Matteo Pallocca, Nico Sanna, Ernesto Picardi, Graziano Pesole, Tiziana Castrignanò WEP: a high-performance analysis pipeline for whole-exome data. Search on Bibsonomy BMC Bioinform. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
26Rafik Chaabouni Break WEP Faster with Statistical Analysis. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
26Pouyan Sepehrdad, Petr Susil, Serge Vaudenay, Martin Vuagnoux Smashing WEP in a Passive Attack. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
26Md. Golam Rashed, M. Hasnat Kabir, Shaikh Enayet Ullah WEP: An Energy Efficient Protocol for Cluster Based Heterogeneous Wireless Sensor Network Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
26T. Tsukaune, Yosuke Todo, Masakatu Morii Proposal of a Secure WEP Operation against Existing Key Recovery Attacks and its Evaluation. Search on Bibsonomy AsiaJCIS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26Masakatu Morii, Yosuke Todo Cryptanalysis for RC4 and Breaking WEP/WPA-TKIP. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26José A. R. Pacheco de Carvalho, Hugo Veiga, Nuno Marques, C. F. Ribeiro Pacheco, Antonio D. Reis TCP, UDP and FTP Performances of Laboratory Wi-Fi IEEE 802.11g WEP Point-to-Point Links. Search on Bibsonomy CENTERIS (2) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Ryoichi Teramura, Yasuo Asakura, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Mustafa ElGili, Samani A. Talab, Awad H. Ali WEP and WPA Improvement. Search on Bibsonomy Wirel. Sens. Netw. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26José A. R. Pacheco de Carvalho, Hugo Veiga, Nuno Marques, Claudia F. F. P. Ribeiro Pacheco, Antonio D. Reis A contribution to laboratory performance measurements of IEEE 802.11 a/g WEP point-to-point links using TCP, UDP and FTP. Search on Bibsonomy CSNDSP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26José A. R. Pacheco de Carvalho, Hugo Veiga, Nuno Marques, C. F. Ribeiro Pacheco, Antonio D. Reis A Contribution to Laboratory Performance Measurements of IEEE 802.11 B, G WEP Point-to-Point Links. Search on Bibsonomy WINSYS The full citation details ... 2010 DBLP  BibTeX  RDF
26Saif ur Rehman, Saeed Ullah, Sardar Ali On enhancing the WEP security against brute-force and compromised keys. Search on Bibsonomy CISIM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Taskin Koçak, Mohit Jagetia A WEP post-processing algorithm for a Robust 802.11 WLAN implementation. Search on Bibsonomy Comput. Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Kazukuni Kobara, Hideki Imai IVs to Skip for Immunizing WEP against FMS Attack. Search on Bibsonomy IEICE Trans. Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Soundararajan Chandramathi, K. V. Arunkumar, S. Deivarayan, P. Sendhilkumar, K. Vaithiyanathan Modified WEP key management for enhancing WLAN security. Search on Bibsonomy Int. J. Inf. Commun. Technol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Martin Beck, Erik Tews Practical attacks against WEP and WPA. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2008 DBLP  BibTeX  RDF
26Halil-Ibrahim Bulbul, Ihsan Batmaz, Mesut Ozel Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Bogdan Crainicu, Florian Mircea Boian KSAm - An Improved RC4 Key-Scheduling Algorithm for Securing WEP. Search on Bibsonomy TeNe The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Longjun Zhang, Tao Zou An Improved Key Management Scheme for WEP. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Erik Tews Attacks on the WEP protocol. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2007 DBLP  BibTeX  RDF
26Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin Breaking 104 bit WEP in less than 60 seconds. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2007 DBLP  BibTeX  RDF
26Therverson Kanavathy Security Flaws in WEP Data Encryption Standard. Search on Bibsonomy ICWN The full citation details ... 2007 DBLP  BibTeX  RDF
26Kevin Curran, Elaine Smyth Demonstrating the Wired Equivalent Privacy (WEP) Weaknesses Inherent in Wi-Fi Networks. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Radomir Prodanovic, Dejan Simic Holistic approach to Wep protocol in securing wireless network infrastructure. Search on Bibsonomy Comput. Sci. Inf. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Kazukuni Kobara, Hideki Imai Key-Dependent Weak IVs and Weak Keys in WEP - How to Trace Conditions Back to Their Patterns - . Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Ramzi A. Haraty, Walid El Horr A hybrid cryptosystem based on WEP for 802.11 networks. Search on Bibsonomy J. Comput. Methods Sci. Eng. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Jin-Cherng Lin, Yu-Hsin Kao Burglarproof WEP Protocol on Wireless Infrastructure. Search on Bibsonomy PACIS The full citation details ... 2006 DBLP  BibTeX  RDF
26Ramzi A. Haraty, Walid El Horr Securing wireless networks with enhanced WEP. Search on Bibsonomy CAINE The full citation details ... 2006 DBLP  BibTeX  RDF
26Darshan Purandare, Ratan K. Guha, Joohan Lee An IV Collision Avoidance Algorithm - Strengthening the WEP. Search on Bibsonomy ICWN The full citation details ... 2005 DBLP  BibTeX  RDF
26Darshan Purandare, Ratan K. Guha Enhancing Message Privacy in WEP. Search on Bibsonomy Wireless Information Systems The full citation details ... 2005 DBLP  BibTeX  RDF
26Wen-Chuan Hsieh, Yi-Hsien Chiu, Chi-Chun Lo An Interference-Based Prevention Mechanism Against WEP Attack for 802.11B Network. Search on Bibsonomy Net-Con The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Arnulfo Ochoa Indart, Jesús Arturo Pérez Díaz Analysis of WEP Performance on Mobile Devices. Search on Bibsonomy WOSIS The full citation details ... 2004 DBLP  BibTeX  RDF
26Giannis Pikrammenos, Ghassan Sarkis, John Soldatos 0001, Vasilios Anagnostopoulos Hidden Layer Authentication using Smart Card for WEP-based WLANS. Search on Bibsonomy SEC The full citation details ... 2003 DBLP  BibTeX  RDF
26Adam Stubblefield, John Ioannidis, Aviel D. Rubin Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. Search on Bibsonomy NDSS The full citation details ... 2002 DBLP  BibTeX  RDF
26Panu Hämäläinen, Marko Hännikäinen, Timo Hämäläinen 0001, Jukka Saarinen Hardware implementation of the improved WEP and RC4 encryption algorithms for wireless terminals. Search on Bibsonomy EUSIPCO The full citation details ... 2000 DBLP  BibTeX  RDF
26Dimitris Christodoulakis, Grammati E. Pantziou WEP - a workstation for education in programming. Search on Bibsonomy J. Syst. Softw. The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
26M. Devos, Geert Adriaens, Yves D. Willems The Parallel Expert Parser (PEP): a thoroughly revised descendent of the Word Expert Parser (WEP). Search on Bibsonomy COLING The full citation details ... 1988 DBLP  BibTeX  RDF
26Geert Adriaens WEP (Word Expert Parsing) Revised and Applied to Dutch. Search on Bibsonomy ECAI The full citation details ... 1986 DBLP  BibTeX  RDF
25Subhasis Mukherjee, Maynul Hasan, Belal Chowdhury, Morshed U. Chowdhury Security of RFID Systems - A Hybrid Approach. Search on Bibsonomy SNPD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF IV, RFID, RSA, SCM, WEP
25Gh. Rasool Begh, Ajaz Hussain Mir Quantification of the Effect of Security on Performance in Wireless LANs. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Wireless LAN, TCP, Packet Loss, UDP, WEP, WPA
25Carsten Maple, Helen Jacobs, Matthew Reeve Choosing the Right Wireless LAN Security Protocol for the Home and Business User. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, WLANs, WEP, WPA, TKIP
25Shih Tsung Liang, Ming-Yi Weng Protecting IEEE 802.11 Wireless LANs against the FCS False Blocking Attack. Search on Bibsonomy ICPADS (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF false blocking attack, FCS false blocking detection and recovery, WLAN, IEEE 802.11, WEP
25Pascal Meunier, Sofie Nystrom, Seny Kamara, Scott Yost, Kyle Alexander, Dan Noland, Jared Crane ActiveSync, TCP/IP and 802.11b Wireless Vulnerabilities of WinCE-Based PDAs. Search on Bibsonomy WETICE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF WinCE, ActiveSync, security, wireless, vulnerability, WEP, 802.11b
24Steven K. Brawn, R. Mark Koan, Kelly Caye Staying secure in an insecure world: 802.1x secure wireless computer connectivity for students, faculty, and staff to the campus network. Search on Bibsonomy SIGUCCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF PEAP, dynamic WEP, wireless network, authentication, VPN, 802.1x
16Jie Xiong 0001, Kyle Jamieson SecureAngle: improving wireless security using angle-of-arrival information (poster abstract). Search on Bibsonomy SIGCOMM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF SecureAngle, wireless, 802.11, angle of arrival
16Bo Yan, Guanling Chen, Jie Wang 0002, Hongda Yin Robust Detection of Unauthorized Wireless Access Points. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF intrusion detection, IEEE 802.11, wireless security, rogue AP
16Andrew Gin, Ray Hunt Performance analysis of evolving wireless IEEE 802.11 security architectures. Search on Bibsonomy Mobility Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IEEE 802.1x, TKIP (temporal key integrity protocol), WiFi protected access (WPA, WPA2), performance analysis, wireless LAN, PDA (personal digital assistant), IEEE 802.11i
16Hongda Yin, Guanling Chen, Jie Wang 0002 Detecting protected layer-3 rogue APs. Search on Bibsonomy BROADNETS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Raheel A. Malik, Raymond A. Hansen, James E. Goldman, Anthony H. Smith Laboratory modules for conducting comparative analysis of 802.11 frames. Search on Bibsonomy SIGITE Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF wireless networking education, information technology education
16Binod Vaidya, SangDuck Lee, Jae-Kyun Han, Seung Jo Han Authentication Mechanism Using One-Time Password for 802.11 Wireless LAN. Search on Bibsonomy CSR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Dong Phil Kim, Seok Joo Koh, Sang Wook Kim An Integrated Scheme for Intrusion Detection in WLAN. Search on Bibsonomy ICOIN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Raquel Lacuesta Gilaberte, Lourdes Peñalver Herrero Spontaneous networks: Trust in a world of equals. Search on Bibsonomy ICNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16René Neumerkel, Stephan Groß A Sophisticated Solution for Revealing Attacks on Wireless LAN. Search on Bibsonomy TrustBus The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Kjell Jørgen Hole, Erlend Dyrnes, Per Thorsheim Securing Wi-Fi Networks. Search on Bibsonomy Computer The full citation details ... 2005 DBLP  DOI  BibTeX  RDF wireless hacking, wireless security, virtual private networks, Wi-Fi networks
16Fernando C. Colón Osorio, Emmanuel Agu, Kerry McKay Measuring energy-security tradeoffs in wireless networks. Search on Bibsonomy IPCCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16George Dean Bissias, Marc Liberatore, David D. Jensen, Brian Neil Levine Privacy Vulnerabilities in Encrypted HTTP Streams. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Hamdy S. Soliman, Mohammed Omari Application of synchronous dynamic encryption system in mobile wireless domains. Search on Bibsonomy Q2SWinet The full citation details ... 2005 DBLP  DOI  BibTeX  RDF dynamic encryption, flexible integrity, integrity violations, mobile network security, permutation vectors, seamless handover
16Debabrata Nayak, Deepak B. Phatak, Ved Prakash Gulati Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, P. Sasikala, Seoung-Hyeon Lee, Jae-Kwang Lee Security Threats and Countermeasures in WLAN. Search on Bibsonomy AINTEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Stephen Michell, Kannan Srinivasan State based key hop protocol: a lightweight security protocol for wireless networks. Search on Bibsonomy PE-WASUN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF low power security, state based encryption, wireless security, computer network security, wireless sensor network security
16Hea Suk Jo, Hee Yong Youn A New Synchronization Protocol for Authentication in Wireless LAN Environment. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Hea Suk Jo, Hee Yong Youn A New Synchronization Protocol for Authentication in Wireless LAN Environment. Search on Bibsonomy ICCSA (3) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Tadashi Komori, Takamichi Saito A Secure Wireless LAN System Retaining Privacy. Search on Bibsonomy AINA (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Florina Almenárez, Daniel Díaz Sánchez, Andrés Marín López Secure Ad-Hoc mBusiness: EnhancingWindowsCE Security. Search on Bibsonomy TrustBus The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Daniel B. Faria, David R. Cheriton MobiCom poster: public-key-based secure Internet access. Search on Bibsonomy ACM SIGMOBILE Mob. Comput. Commun. Rev. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Daniel B. Faria, David R. Cheriton DoS and authentication in wireless public access networks. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2002 DBLP  DOI  BibTeX  RDF security, wireless networks, DoS
Displaying result #1 - #100 of 101 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license