Computer
Shepherd: A lightweight statistical authentication protocol for access control in wireless LANs
Computer Communications
Authentication mechanism using one-time password for 802.11 wireless LAN
CSR'06 Proceedings of the First international computer science conference on Theory and Applications
Adapting a captive portal to enable SMS-Based micropayment for wireless internet access
ICQT'06 Proceedings of the 5th international conference on Internet Charging and QoS Technologies: performability has its Price
Investigating authentication mechanisms for wireless mobile network
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Hi-index | 0.00 |
From the Publisher:Wireless networks have opened up new possibilities for all types of users. From typical LAN environments to wireless ISPs to ad-hoc networking, 802.11, the most popular wireless LAN protocol, is changing the way we think about networking. Wireless networks provide new security challenges for users and network administrators alike. The lack of physical security, access to free auditing tools that double as attack tools, and the ability to monitor traffic without risk of being noticed make wireless networks an easy target for malicious users. Every link of the wireless network needs to be protected in order to properly secure your data. This book provides information on the fundamentals of wireless security. Readers will understand how 802.11 networks work and where the weak points are. It is important to know the potential attacks and the real risks in deploying a wireless network before attempting to secure one. 802.11 Security provides practical solutions for all major components of an 802.11 network. Station security configurations are documented for many operating systems, including Linux, FreeBSD, OpenBSD, Mac OS X, and Windows. Real world networks contain many different operating systems, and this book will give you the tools to secure whatever is thrown your way.