A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Computer Communications
Evolution of wireless LAN security architecture to IEEE 802.11i (WPA2)
AsiaCSN '07 Proceedings of the Fourth IASTED Asian Conference on Communication Systems and Networks
Hi-index | 0.00 |
Assessing the extent of the security risks involved in wireless networking technology by considering three possible scenarios demonstrating vulnerabilities.