Concept for Deploying Wireless in the Enterprise Infrastructure: Balancing Security and Positive QoE for the End-Users
暂无分享,去创建一个
[1] Moustafa Chenine,et al. Using Enterprise Architecture Models for System Quality Analysis , 2008, 2008 12th International IEEE Enterprise Distributed Object Computing Conference.
[2] Brian Everitt,et al. Principles of Multivariate Analysis , 2001 .
[3] Simon Heron,et al. Encryption: Advanced Encryption Standard (AES) , 2009 .
[4] Fernando Boavida,et al. Multicast and IP Multicast Support in Wireless Sensor Networks , 2008, J. Networks.
[5] Z. Hasan. A Survey on Shari’Ah Governance Practices in Malaysia, GCC Countries and the UK , 2011 .
[6] Adrian Farrel,et al. GMPLS: the promise of the next-generation optical control plane , 2005, IEEE Communications Magazine.
[7] Fernando Boavida,et al. Mobility management in IP-based Wireless Sensor Networks , 2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[8] Ulrich Frank,et al. Multi-perspective enterprise modeling (MEMO) conceptual framework and modeling languages , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[9] Arash Habibi Lashkari,et al. A survey on wireless security protocols (WEP, WPA and WPA2/802.11i) , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.
[10] Ivan Martinovic,et al. Phishing in the Wireless: Implementation and Analysis , 2007, SEC.
[11] Kyung Sup Kwak,et al. Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.
[12] Hein S. Venter. New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa , 2007, SEC.
[13] Min-Xiou Chen,et al. An efficient location tracking structure for wireless sensor networks , 2009, Comput. Commun..
[14] Tarun Kumar,et al. Threats and Vulnerabilities in Wireless Mesh Networks , 2009 .
[15] Jyh-Cheng Chen,et al. Extensible authentication protocol (EAP) and IEEE 802.1x: tutorial and empirical experience , 2005, IEEE Commun. Mag..
[16] Dan Simon,et al. PPP EAP TLS Authentication Protocol , 1999, RFC.
[17] I. Jolliffe. Principal Component Analysis , 2002 .
[18] Bülent Tavli,et al. Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks , 2009, Comput. Stand. Interfaces.
[19] Carl Wijting,et al. Mesh WLAN networks: concept and system design , 2006, IEEE Wireless Communications.
[20] John C. Mitchell,et al. Analysis of the 802.11i 4-way handshake , 2004, WiSe '04.