A comparative study of WLAN security protocols: WPA, WPA2
暂无分享,去创建一个
Mohammed Mahmudur Rahman | Sazid Zaman Khan | A. B. M. Shamsuzzaman Sadi | Towfique Anam | Mohamed Abdirazak | Abdillahi Hasan Adnan | Abdillahi Hassan Adnan | Mohamed Musse Omar | Mohamed Abdirazak | A. B. M. S. Sadi | Towfique Anam | S. Khan | Mohammed Mostafizur Rahman | M. Omar | A. S. Sadi | Mohammed Mahmudur Rahman | Mohamed Musse Omar
[1] Dan Dobkin. Indoor Propagation and Wavelength , 2002 .
[2] Praphul Chandra. BULLETPROOF WIRELESS SECURITY: GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering) , 2005 .
[3] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[4] Harold Lars McCarter. Analyzing Wireless LAN Security Overhead , 2006 .
[5] Keith Fleming. Wireless Security Initiatives , .
[6] Nilufar Baghaei,et al. Security performance of loaded IEEE 802.11b wireless networks , 2004, Comput. Commun..
[7] Ray Hunt,et al. Impact of Security Architectures on Wireless Network Performance , 2003, MWCN.
[8] Avishai Wool,et al. A note on the fragility of the "Michael" message integrity code , 2004, IEEE Transactions on Wireless Communications.
[9] Tang Ming . Wei Lian. Si Tuo Lin Si,et al. Cryptography and Network Security - Principles and Practice , 2015 .
[10] Andrew Gin. The Performance of the IEEE 802.11i Security Specification on Wireless LANs , 2005 .
[11] Erik Tews,et al. Practical attacks against WEP and WPA , 2009, WiSec '09.