IEEE 802.11 wireless LAN security performance using multiple clients
暂无分享,去创建一个
[1] Benny Bing,et al. A novel technique for quantitative performance evaluation of wireless LANs , 1998, Comput. Commun..
[2] James C. Chen. Measured Performance of 5-GHz 802.11a Wireless LAN Systems , 2001 .
[3] Scott O. Bradner,et al. Benchmarking Methodology for Network Interconnect Devices , 1999, RFC.
[4] Carey L. Williamson,et al. Internet Traffic Measurement , 2001, IEEE Internet Comput..
[5] Ray Hunt,et al. Impact of Security Architectures on Wireless Network Performance , 2003, MWCN.
[6] A. Udaya Shankar,et al. An Empirical Characterization of Instantaneous Throughput in 802.11b WLANs , 2002 .
[7] Rui Pedro Lopes,et al. Performance analysis of a wireless MAN , 2001, Proceedings IEEE International Symposium on Network Computing and Applications. NCA 2001.
[8] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[9] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[10] Timo Hämäläinen,et al. Trends in personal wireless data communications , 2002, Comput. Commun..
[11] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[12] J. Tourrilhes. Packet frame grouping: improving IP multimedia performance over CSMA/CA , 1998, ICUPC '98. IEEE 1998 International Conference on Universal Personal Communications. Conference Proceedings (Cat. No.98TH8384).
[13] Guido Aben,et al. Net throughput with IEEE 802.11 wireless LANs , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).
[14] A T Karygiannis,et al. Wireless Network Security: 802.11, Bluetooth and Handheld Devices , 2002 .
[15] W. Stallings. IEEE 802.11: moving closer to practical wireless LANs , 2001, IT Professional.
[16] Dan Simon,et al. PPP EAP TLS Authentication Protocol , 1999, RFC.
[17] Jenne Wong,et al. Performance investigation of secure 802.11 wireless LANs : raising the security bar to which level? , 2003 .
[18] Sheila Convery,et al. SAFE: Wireless LAN Security in Depth , 2001 .
[19] Jesse Walker,et al. Unsafe at any key size; An analysis of the WEP encapsulation , 2000 .
[20] Miguel A. Labrador,et al. Characterization of MPEG-4 traffic over IEEE 802.11b wireless LANs , 2002, 27th Annual IEEE Conference on Local Computer Networks, 2002. Proceedings. LCN 2002..
[21] Huseyin Selcuk Ozturk,et al. Evaluation of Secure 802.1X Port-Based Network Access Authentication Over 802.11 Wireless Local Area Networks , 2003 .
[22] Sridhar Iyer,et al. Throughput performance of the distributed and point coordination functions of an IEEE 802.11 wireless LAN , 2002 .
[23] William A. Arbaugh,et al. YOUR 802.11 WIRELESS NETWORK HAS NO CLOTHES , 2001 .
[24] Larry J. Blunk,et al. PPP Extensible Authentication Protocol (EAP) , 1998, RFC.
[25] Matthew S. Gast,et al. 802.11 Wireless Networks: The Definitive Guide , 2002 .
[26] B. Bing. Measured performance of the IEEE 802.11 wireless LAN , 1999, Proceedings 24th Conference on Local Computer Networks. LCN'99.
[27] Marco Conti,et al. IEEE 802.11 wireless LAN: capacity analysis and protocol enhancement , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.
[28] G. Held. The ABCs of IEEE 802.77 , 2001 .
[29] Steve Kapp. 802.11: Leaving the Wire Behind , 2002, IEEE Internet Comput..
[30] George C. Polyzos,et al. TCP and UDP performance over a wireless LAN , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[31] Gilbert Held. The ABCs of IEEE 802.11 - IT Professional , 2001 .