Journal of Theoretical and Applied Electronic Commerce Research
Unintended invitation: organizational wi-fi use by external roaming users
Communications of the ACM
The myths and truths of wireless security
Communications of the ACM - Alternate reality gaming
Network Security: Know It All: Know It All
Network Security: Know It All: Know It All
Security considerations in m-learning: threats and countermeasures
Advanced Technology for Learning
Usability improvements for WLAN access
HCI'07 Proceedings of the 12th international conference on Human-computer interaction: interaction design and usability
Improving users' security choices on home wireless networks
Proceedings of the Sixth Symposium on Usable Privacy and Security
A study on the security, the performance and the penetration of Wi-Fi networks in a Greek urban area
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Hi-index | 0.02 |
Although WiFi technology security vulnerabilities are well known, the extent of these vulnerabilities may be surprising: War driving experiences identify many potential points of entry.