The IEEE 802.11 Handbook: A Designer's Companion
The IEEE 802.11 Handbook: A Designer's Companion
Weaknesses in the Key Scheduling Algorithm of RC4
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Secure authentication system for public WLAN roaming
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
A Secure Wireless Agent-based Testbed
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
Analysis of the 802.11i 4-way handshake
Proceedings of the 3rd ACM workshop on Wireless security
Fast authentication methods for handovers between IEEE 802.11 wireless LANs
Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Securing Wireless Networks in a University Environment
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
802.11 Wireless Networks: The Definitive Guide, Second Edition
802.11 Wireless Networks: The Definitive Guide, Second Edition
Wireless LAN security and IEEE 802.11i
IEEE Wireless Communications
A note on the fragility of the "Michael" message integrity code
IEEE Transactions on Wireless Communications
International Journal of High Performance Systems Architecture
Hi-index | 0.00 |
This report provides readers with a detailed explanation of next generation 802.11 wireless security. It describes the inherently flawed Wired Equivalent Privacy (WEP) and explains 802.11i's two-step approach (interim and long-term)to providing effective wireless security. It describes secure methods used to authenticate users in a wireless environment, and presents several sample case studies of wireless deployment. It also includes guidance on best practices for establishing secure wireless networks using the emerging Wi-Fi technology.