Where's the Security in WiFi? An Argument for Industry Awareness
暂无分享,去创建一个
Bryan Hosack | Douglas P. Twitchell | Glen W. Sagers | R. J. Rowley | Ranjitha Nagaraj | Bryan Hosack | R. Rowley | Ranjitha Nagaraj
[1] Matthew P. Hottell,et al. Predictors of Home-Based Wireless Security , 2006, WEIS.
[2] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[3] Ann E. Schlosser,et al. The Evolution of the Digital Divide: How Gaps in Internet Access May Impact Electronic Commerce , 2006, J. Comput. Mediat. Commun..
[4] Martin Beck. Enhanced TKIP Michael Attacks , 2014, ArXiv.
[5] Allan Fisher,et al. Unlocking the Clubhouse : Women in Computing by Allan Fisher , 2015 .
[6] M. G. Quibria,et al. Digital Divide: Determinants and Policies with Special Reference to Asia , 2003 .
[7] T. Davenport. Thinking for a living : how to get better performance and results from knowledge workers , 2005 .
[8] Wallace Koehler,et al. Virtual inequality: Beyond the digital divide , 2004, J. Assoc. Inf. Sci. Technol..
[9] J. C. Thomas,et al. The New Face of Government: Citizen-Initiated Contacts in the Era of E-Government , 2003 .
[10] James B. Pick,et al. Worldwide digital divide: influences of education, workforce, economic, and policy factors on information technology , 2007, SIGMIS CPR '07.
[11] FisherAllan,et al. Unlocking the clubhouse , 2002 .
[12] Peter M. Shane,et al. Democracy Online: The Prospects for Political Renewal Through the Internet , 2004 .
[13] Lawrence F. Katz,et al. Computing Inequality: Have Computers Changed the Labor Market? , 1997 .