Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Demystifying the Ipsec Puzzle
Security flaws in 802.11 data link protocols
Communications of the ACM - Wireless networking security
Wireless LAN location-sensing for security applications
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Autonomic 802.11 Wireless LAN Security Auditing
IEEE Security and Privacy
Security for wireless sensor networks
Wireless sensor networks
Security for wireless sensor networks
Wireless sensor networks
Provable Cryptographic Security and its Applications to Mobile Wireless Computing
Wireless Personal Communications: An International Journal
Securing wireless systems via lower layer enforcements
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Journal of Theoretical and Applied Electronic Commerce Research
The political economy of standards setting by newcomers: China's WAPI and South Korea's WIPI
Telecommunications Policy
Wireless insecurity: examining user security behavior on public networks
Communications of the ACM
Evolution of wireless LAN security architecture to IEEE 802.11i (WPA2)
AsiaCSN '07 Proceedings of the Fourth IASTED Asian Conference on Communication Systems and Networks
SkyNET: a 3G-enabled mobile attack drone and stealth botmaster
WOOT'11 Proceedings of the 5th USENIX conference on Offensive technologies
Defending against jamming attacks in wireless local area networks
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Hi-index | 0.02 |
Assessing inherent wireless network security deficiencies and seeking solutions.