Channel surfing and spatial retreats: defenses against wireless denial of service
Proceedings of the 3rd ACM workshop on Wireless security
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
An analysis of wireless security
Journal of Computing Sciences in Colleges
Dependability in Wireless Networks: Can We Rely on WiFi?
IEEE Security and Privacy
Anonymous authentication scheme for wireless communications
International Journal of Mobile Communications
The proactive intrusion prevention for Wireless Local Area Network
International Journal of Mobile Communications
Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
Information fusion for computer security: State of the art and open issues
Information Fusion
Performance evaluation of key exchange using integrity regions in different mobility models
Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief
Hi-index | 0.00 |
How can a network be secure that has no physical barriers? That is the paradox of wireless security in general and networks in particular. New standards attempt to strenghen security barriers in this attractive and growing arena.