Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Security problems in 802.11-based networks
Communications of the ACM - Wireless networking security
Secure authentication system for public WLAN roaming
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Autonomic 802.11 Wireless LAN Security Auditing
IEEE Security and Privacy
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Application of synchronous dynamic encryption system in mobile wireless domains
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Enhancing the security of corporate Wi-Fi networks using DAIR
Proceedings of the 4th international conference on Mobile systems, applications and services
Performance study of fast BSS transition using IEEE 802.11r
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Secure authentication system for public WLAN roaming
Mobile Networks and Applications - Special issue: Wireless mobile wireless applications and services on WLAN hotspots
Securing wireless systems via lower layer enforcements
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
International Journal of Wireless and Mobile Computing
International Journal of Mobile Communications
Network Security: Know It All: Know It All
Network Security: Know It All: Know It All
A performance analysis of the spring protocol through simulation
SpringSim '07 Proceedings of the 2007 spring simulation multiconference - Volume 3
Password-based authenticated key establishment for wireless group communications in an ad-hoc mode
International Journal of Communication Networks and Distributed Systems
The political economy of standards setting by newcomers: China's WAPI and South Korea's WIPI
Telecommunications Policy
RAP: protecting commodity wi-fi networks from rogue access points
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
Evolution of wireless LAN security architecture to IEEE 802.11i (WPA2)
AsiaCSN '07 Proceedings of the Fourth IASTED Asian Conference on Communication Systems and Networks
Design of WLAN secure system against weaknesses of the ieee 802.1x
ICHIT'06 Proceedings of the 1st international conference on Advances in hybrid information technology
Improving users' security choices on home wireless networks
Proceedings of the Sixth Symposium on Usable Privacy and Security
Analyzing uncertainty in TG protection graphs with TG/MC
Journal of Computer Security
Review: Cognitive radio network security: A survey
Journal of Network and Computer Applications
International Journal of Information Security and Privacy
Exposing WPA2 security protocol vulnerabilities
International Journal of Information and Computer Security
Hi-index | 0.00 |
Understanding the difficulties in security protocol design and attempting to relocate the struggle between hacker and defender to a different protocol layer.